Dec 13 14:26:21.111288 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:26:21.111329 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:26:21.111356 kernel: BIOS-provided physical RAM map: Dec 13 14:26:21.111369 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:26:21.111381 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:26:21.111393 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:26:21.111412 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:26:21.111426 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:26:21.111439 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:26:21.111452 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:26:21.111465 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:26:21.111478 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:26:21.111492 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:26:21.111506 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:26:21.111526 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:26:21.111540 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:26:21.111555 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:26:21.111569 kernel: NX (Execute Disable) protection: active Dec 13 14:26:21.111583 kernel: efi: EFI v2.70 by EDK II Dec 13 14:26:21.111598 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:26:21.111612 kernel: random: crng init done Dec 13 14:26:21.111627 kernel: SMBIOS 2.4 present. Dec 13 14:26:21.111645 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:26:21.111659 kernel: Hypervisor detected: KVM Dec 13 14:26:21.111674 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:26:21.111688 kernel: kvm-clock: cpu 0, msr 17019a001, primary cpu clock Dec 13 14:26:21.111703 kernel: kvm-clock: using sched offset of 12928370842 cycles Dec 13 14:26:21.111719 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:26:21.111734 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:26:21.111749 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:26:21.111765 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:26:21.111780 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:26:21.111799 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:26:21.111813 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:26:21.111828 kernel: Using GB pages for direct mapping Dec 13 14:26:21.111842 kernel: Secure boot disabled Dec 13 14:26:21.111857 kernel: ACPI: Early table checksum verification disabled Dec 13 14:26:21.111872 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:26:21.111887 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:26:21.113990 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:26:21.114022 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:26:21.114038 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:26:21.114055 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:26:21.114070 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:26:21.114087 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:26:21.114103 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:26:21.114122 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:26:21.114137 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:26:21.114153 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:26:21.114168 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:26:21.114184 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:26:21.114200 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:26:21.114216 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:26:21.114231 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:26:21.114247 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:26:21.114265 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:26:21.114281 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:26:21.114297 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:26:21.114348 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:26:21.114363 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:26:21.114379 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:26:21.114393 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:26:21.114409 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:26:21.114426 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:26:21.114446 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 14:26:21.114461 kernel: Zone ranges: Dec 13 14:26:21.114477 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:26:21.114493 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:26:21.114509 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:26:21.114525 kernel: Movable zone start for each node Dec 13 14:26:21.114541 kernel: Early memory node ranges Dec 13 14:26:21.114555 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:26:21.114571 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:26:21.114590 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:26:21.114605 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:26:21.114621 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:26:21.114637 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:26:21.114653 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:26:21.114668 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:26:21.114684 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:26:21.114699 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:26:21.114716 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:26:21.114735 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:26:21.114751 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:26:21.114766 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:26:21.114783 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:26:21.114799 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:26:21.114814 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:26:21.114830 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:26:21.114846 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:26:21.114861 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:26:21.114881 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:26:21.114914 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:26:21.114930 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:26:21.114945 kernel: Booting paravirtualized kernel on KVM Dec 13 14:26:21.114961 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:26:21.114977 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:26:21.114993 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:26:21.115009 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:26:21.115025 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:26:21.115043 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:26:21.115059 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:26:21.115075 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:26:21.115090 kernel: Policy zone: Normal Dec 13 14:26:21.115108 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:26:21.115123 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:26:21.115139 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:26:21.115155 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:26:21.115172 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:26:21.115191 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344876K reserved, 0K cma-reserved) Dec 13 14:26:21.115207 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:26:21.115222 kernel: Kernel/User page tables isolation: enabled Dec 13 14:26:21.115238 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:26:21.115252 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:26:21.115267 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:26:21.115282 kernel: rcu: RCU event tracing is enabled. Dec 13 14:26:21.115441 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:26:21.115463 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:26:21.115492 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:26:21.115509 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:26:21.115656 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:26:21.115675 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:26:21.115692 kernel: Console: colour dummy device 80x25 Dec 13 14:26:21.115710 kernel: printk: console [ttyS0] enabled Dec 13 14:26:21.115727 kernel: ACPI: Core revision 20210730 Dec 13 14:26:21.115743 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:26:21.115884 kernel: x2apic enabled Dec 13 14:26:21.122942 kernel: Switched APIC routing to physical x2apic. Dec 13 14:26:21.122964 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:26:21.122982 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:26:21.123000 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:26:21.123017 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:26:21.123033 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:26:21.123050 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:26:21.123074 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:26:21.123091 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:26:21.123108 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:26:21.123125 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:26:21.123142 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:26:21.123158 kernel: RETBleed: Mitigation: IBRS Dec 13 14:26:21.123176 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:26:21.123193 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:26:21.123210 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:26:21.123230 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:26:21.123248 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:26:21.123265 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:26:21.123282 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:26:21.123305 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:26:21.123322 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:26:21.123339 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:26:21.123356 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:26:21.123373 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:26:21.123393 kernel: LSM: Security Framework initializing Dec 13 14:26:21.123409 kernel: SELinux: Initializing. Dec 13 14:26:21.123426 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:26:21.123443 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:26:21.123460 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:26:21.123477 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:26:21.123494 kernel: signal: max sigframe size: 1776 Dec 13 14:26:21.123510 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:26:21.123527 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:26:21.123547 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:26:21.123564 kernel: x86: Booting SMP configuration: Dec 13 14:26:21.123581 kernel: .... node #0, CPUs: #1 Dec 13 14:26:21.123598 kernel: kvm-clock: cpu 1, msr 17019a041, secondary cpu clock Dec 13 14:26:21.123616 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:26:21.123634 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:26:21.123651 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:26:21.123667 kernel: smpboot: Max logical packages: 1 Dec 13 14:26:21.123687 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:26:21.123705 kernel: devtmpfs: initialized Dec 13 14:26:21.123722 kernel: x86/mm: Memory block size: 128MB Dec 13 14:26:21.123738 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:26:21.123755 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:26:21.123778 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:26:21.123795 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:26:21.123812 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:26:21.123829 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:26:21.123850 kernel: audit: type=2000 audit(1734099979.794:1): state=initialized audit_enabled=0 res=1 Dec 13 14:26:21.123865 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:26:21.123882 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:26:21.123912 kernel: cpuidle: using governor menu Dec 13 14:26:21.123930 kernel: ACPI: bus type PCI registered Dec 13 14:26:21.123946 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:26:21.123963 kernel: dca service started, version 1.12.1 Dec 13 14:26:21.123980 kernel: PCI: Using configuration type 1 for base access Dec 13 14:26:21.123997 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:26:21.124016 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:26:21.124032 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:26:21.124047 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:26:21.124061 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:26:21.124076 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:26:21.124090 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:26:21.124104 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:26:21.124119 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:26:21.124134 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:26:21.124154 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:26:21.124170 kernel: ACPI: Interpreter enabled Dec 13 14:26:21.124188 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:26:21.124205 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:26:21.124222 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:26:21.124239 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:26:21.124256 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:26:21.124522 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:26:21.124698 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:26:21.124719 kernel: PCI host bridge to bus 0000:00 Dec 13 14:26:21.124881 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:26:21.125051 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:26:21.125202 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:26:21.125352 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:26:21.125491 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:26:21.125671 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:26:21.126133 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:26:21.126577 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:26:21.126816 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:26:21.127013 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:26:21.127182 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:26:21.127387 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:26:21.127567 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:26:21.127742 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:26:21.127959 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:26:21.128129 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:26:21.128290 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:26:21.128459 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:26:21.128485 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:26:21.128503 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:26:21.128521 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:26:21.128538 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:26:21.128555 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:26:21.128572 kernel: iommu: Default domain type: Translated Dec 13 14:26:21.128589 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:26:21.128606 kernel: vgaarb: loaded Dec 13 14:26:21.128624 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:26:21.128644 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:26:21.128661 kernel: PTP clock support registered Dec 13 14:26:21.128679 kernel: Registered efivars operations Dec 13 14:26:21.128696 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:26:21.128713 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:26:21.128730 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:26:21.128747 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:26:21.128764 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:26:21.128780 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:26:21.128800 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:26:21.128816 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:26:21.128833 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:26:21.128850 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:26:21.128867 kernel: pnp: PnP ACPI init Dec 13 14:26:21.128884 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:26:21.128915 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:26:21.128932 kernel: NET: Registered PF_INET protocol family Dec 13 14:26:21.128949 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:26:21.128970 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:26:21.128987 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:26:21.129004 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:26:21.129021 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:26:21.129039 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:26:21.129056 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:26:21.129072 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:26:21.129090 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:26:21.129110 kernel: NET: Registered PF_XDP protocol family Dec 13 14:26:21.129260 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:26:21.129412 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:26:21.129553 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:26:21.129696 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:26:21.129864 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:26:21.129886 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:26:21.130972 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:26:21.130991 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:26:21.131009 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:26:21.131026 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:26:21.131043 kernel: clocksource: Switched to clocksource tsc Dec 13 14:26:21.131060 kernel: Initialise system trusted keyrings Dec 13 14:26:21.131077 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:26:21.131094 kernel: Key type asymmetric registered Dec 13 14:26:21.131110 kernel: Asymmetric key parser 'x509' registered Dec 13 14:26:21.131131 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:26:21.131148 kernel: io scheduler mq-deadline registered Dec 13 14:26:21.131165 kernel: io scheduler kyber registered Dec 13 14:26:21.131182 kernel: io scheduler bfq registered Dec 13 14:26:21.131198 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:26:21.131217 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:26:21.131418 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:26:21.131442 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:26:21.131603 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:26:21.131630 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:26:21.131795 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:26:21.131816 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:26:21.131833 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:26:21.131850 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:26:21.131868 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:26:21.131885 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:26:21.132070 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:26:21.132097 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:26:21.132114 kernel: i8042: Warning: Keylock active Dec 13 14:26:21.132130 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:26:21.132147 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:26:21.132311 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:26:21.132464 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:26:21.132619 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:26:20 UTC (1734099980) Dec 13 14:26:21.132763 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:26:21.132789 kernel: intel_pstate: CPU model not supported Dec 13 14:26:21.132806 kernel: pstore: Registered efi as persistent store backend Dec 13 14:26:21.132823 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:26:21.132840 kernel: Segment Routing with IPv6 Dec 13 14:26:21.132857 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:26:21.132874 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:26:21.132904 kernel: Key type dns_resolver registered Dec 13 14:26:21.132922 kernel: IPI shorthand broadcast: enabled Dec 13 14:26:21.132939 kernel: sched_clock: Marking stable (740661008, 175259925)->(965019671, -49098738) Dec 13 14:26:21.132960 kernel: registered taskstats version 1 Dec 13 14:26:21.132977 kernel: Loading compiled-in X.509 certificates Dec 13 14:26:21.132994 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:26:21.133012 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:26:21.133028 kernel: Key type .fscrypt registered Dec 13 14:26:21.133045 kernel: Key type fscrypt-provisioning registered Dec 13 14:26:21.133062 kernel: pstore: Using crash dump compression: deflate Dec 13 14:26:21.133078 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:26:21.133095 kernel: ima: No architecture policies found Dec 13 14:26:21.133114 kernel: clk: Disabling unused clocks Dec 13 14:26:21.133131 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:26:21.133148 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:26:21.133165 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:26:21.133182 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:26:21.133199 kernel: Run /init as init process Dec 13 14:26:21.133216 kernel: with arguments: Dec 13 14:26:21.133232 kernel: /init Dec 13 14:26:21.133249 kernel: with environment: Dec 13 14:26:21.133268 kernel: HOME=/ Dec 13 14:26:21.133285 kernel: TERM=linux Dec 13 14:26:21.133308 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:26:21.133328 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:26:21.133349 systemd[1]: Detected virtualization kvm. Dec 13 14:26:21.133367 systemd[1]: Detected architecture x86-64. Dec 13 14:26:21.133385 systemd[1]: Running in initrd. Dec 13 14:26:21.133405 systemd[1]: No hostname configured, using default hostname. Dec 13 14:26:21.133422 systemd[1]: Hostname set to . Dec 13 14:26:21.133441 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:26:21.133459 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:26:21.133476 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:26:21.133494 systemd[1]: Reached target cryptsetup.target. Dec 13 14:26:21.133512 systemd[1]: Reached target paths.target. Dec 13 14:26:21.133529 systemd[1]: Reached target slices.target. Dec 13 14:26:21.133550 systemd[1]: Reached target swap.target. Dec 13 14:26:21.133567 systemd[1]: Reached target timers.target. Dec 13 14:26:21.133586 systemd[1]: Listening on iscsid.socket. Dec 13 14:26:21.133603 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:26:21.133621 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:26:21.133639 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:26:21.133656 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:26:21.133674 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:26:21.133695 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:26:21.133713 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:26:21.133750 systemd[1]: Reached target sockets.target. Dec 13 14:26:21.133777 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:26:21.133796 systemd[1]: Finished network-cleanup.service. Dec 13 14:26:21.133814 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:26:21.133833 systemd[1]: Starting systemd-journald.service... Dec 13 14:26:21.133855 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:26:21.133873 kernel: audit: type=1334 audit(1734099981.098:2): prog-id=6 op=LOAD Dec 13 14:26:21.133903 systemd[1]: Starting systemd-resolved.service... Dec 13 14:26:21.133922 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:26:21.133941 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:26:21.133960 kernel: audit: type=1130 audit(1734099981.118:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.133978 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:26:21.133998 kernel: audit: type=1130 audit(1734099981.128:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.134025 systemd-journald[189]: Journal started Dec 13 14:26:21.134109 systemd-journald[189]: Runtime Journal (/run/log/journal/752bf9228a4bd0f5ced7bc0b85e91de4) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:26:21.098000 audit: BPF prog-id=6 op=LOAD Dec 13 14:26:21.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.139500 systemd[1]: Started systemd-journald.service. Dec 13 14:26:21.139665 kernel: audit: type=1130 audit(1734099981.137:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.137885 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 14:26:21.151304 kernel: audit: type=1130 audit(1734099981.145:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.139475 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:26:21.152570 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:26:21.165799 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:26:21.183816 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:26:21.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.189916 kernel: audit: type=1130 audit(1734099981.181:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.191777 systemd-resolved[191]: Positive Trust Anchors: Dec 13 14:26:21.194943 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:26:21.195152 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:26:21.202704 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 14:26:21.204480 systemd[1]: Started systemd-resolved.service. Dec 13 14:26:21.204645 systemd[1]: Reached target nss-lookup.target. Dec 13 14:26:21.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.208914 kernel: audit: type=1130 audit(1734099981.202:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.215258 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:26:21.231044 kernel: audit: type=1130 audit(1734099981.217:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.231082 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:26:21.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.224390 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:26:21.236924 kernel: Bridge firewalling registered Dec 13 14:26:21.237003 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 14:26:21.244760 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:26:21.248935 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:26:21.272917 kernel: SCSI subsystem initialized Dec 13 14:26:21.292297 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:26:21.292365 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:26:21.294030 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:26:21.298837 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 14:26:21.300001 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:26:21.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.312282 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:26:21.324069 kernel: audit: type=1130 audit(1734099981.309:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.327279 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:26:21.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.349930 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:26:21.370934 kernel: iscsi: registered transport (tcp) Dec 13 14:26:21.397939 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:26:21.398027 kernel: QLogic iSCSI HBA Driver Dec 13 14:26:21.443288 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:26:21.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.448663 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:26:21.505962 kernel: raid6: avx2x4 gen() 18364 MB/s Dec 13 14:26:21.522944 kernel: raid6: avx2x4 xor() 8199 MB/s Dec 13 14:26:21.539939 kernel: raid6: avx2x2 gen() 18350 MB/s Dec 13 14:26:21.557945 kernel: raid6: avx2x2 xor() 18617 MB/s Dec 13 14:26:21.574940 kernel: raid6: avx2x1 gen() 14119 MB/s Dec 13 14:26:21.591923 kernel: raid6: avx2x1 xor() 16199 MB/s Dec 13 14:26:21.608939 kernel: raid6: sse2x4 gen() 11083 MB/s Dec 13 14:26:21.626945 kernel: raid6: sse2x4 xor() 6769 MB/s Dec 13 14:26:21.643938 kernel: raid6: sse2x2 gen() 12095 MB/s Dec 13 14:26:21.660938 kernel: raid6: sse2x2 xor() 7448 MB/s Dec 13 14:26:21.677938 kernel: raid6: sse2x1 gen() 10557 MB/s Dec 13 14:26:21.695843 kernel: raid6: sse2x1 xor() 5192 MB/s Dec 13 14:26:21.695918 kernel: raid6: using algorithm avx2x4 gen() 18364 MB/s Dec 13 14:26:21.695941 kernel: raid6: .... xor() 8199 MB/s, rmw enabled Dec 13 14:26:21.696722 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:26:21.711937 kernel: xor: automatically using best checksumming function avx Dec 13 14:26:21.817933 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:26:21.830146 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:26:21.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.829000 audit: BPF prog-id=7 op=LOAD Dec 13 14:26:21.829000 audit: BPF prog-id=8 op=LOAD Dec 13 14:26:21.832463 systemd[1]: Starting systemd-udevd.service... Dec 13 14:26:21.849275 systemd-udevd[388]: Using default interface naming scheme 'v252'. Dec 13 14:26:21.856591 systemd[1]: Started systemd-udevd.service. Dec 13 14:26:21.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.860942 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:26:21.879326 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Dec 13 14:26:21.916798 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:26:21.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:21.918935 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:26:21.985313 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:26:21.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:22.063927 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:26:22.088920 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:26:22.142165 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:26:22.142240 kernel: AES CTR mode by8 optimization enabled Dec 13 14:26:22.146916 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:26:22.214068 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:26:22.270506 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:26:22.270696 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:26:22.270835 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:26:22.271034 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:26:22.271179 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:26:22.271195 kernel: GPT:17805311 != 25165823 Dec 13 14:26:22.271209 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:26:22.271223 kernel: GPT:17805311 != 25165823 Dec 13 14:26:22.271237 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:26:22.271258 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:26:22.271273 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:26:22.316938 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (443) Dec 13 14:26:22.330226 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:26:22.355064 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:26:22.355323 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:26:22.377367 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:26:22.407261 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:26:22.409216 systemd[1]: Starting disk-uuid.service... Dec 13 14:26:22.443045 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:26:22.443212 disk-uuid[511]: Primary Header is updated. Dec 13 14:26:22.443212 disk-uuid[511]: Secondary Entries is updated. Dec 13 14:26:22.443212 disk-uuid[511]: Secondary Header is updated. Dec 13 14:26:22.469013 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:26:22.477956 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:26:23.473945 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:26:23.474182 disk-uuid[512]: The operation has completed successfully. Dec 13 14:26:23.540980 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:26:23.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.541139 systemd[1]: Finished disk-uuid.service. Dec 13 14:26:23.552543 systemd[1]: Starting verity-setup.service... Dec 13 14:26:23.581032 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:26:23.661808 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:26:23.672441 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:26:23.685477 systemd[1]: Finished verity-setup.service. Dec 13 14:26:23.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.775951 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:26:23.776111 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:26:23.776646 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:26:23.825139 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:26:23.825183 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:26:23.825207 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:26:23.777779 systemd[1]: Starting ignition-setup.service... Dec 13 14:26:23.790322 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:26:23.837946 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:26:23.856391 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:26:23.878191 systemd[1]: Finished ignition-setup.service. Dec 13 14:26:23.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.888368 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:26:23.918227 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:26:23.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.926000 audit: BPF prog-id=9 op=LOAD Dec 13 14:26:23.929166 systemd[1]: Starting systemd-networkd.service... Dec 13 14:26:23.963962 systemd-networkd[686]: lo: Link UP Dec 13 14:26:23.963976 systemd-networkd[686]: lo: Gained carrier Dec 13 14:26:23.965447 systemd-networkd[686]: Enumeration completed Dec 13 14:26:23.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.965582 systemd[1]: Started systemd-networkd.service. Dec 13 14:26:23.966592 systemd-networkd[686]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:26:24.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.969238 systemd-networkd[686]: eth0: Link UP Dec 13 14:26:23.969245 systemd-networkd[686]: eth0: Gained carrier Dec 13 14:26:24.044034 iscsid[696]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:26:24.044034 iscsid[696]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:26:24.044034 iscsid[696]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:26:24.044034 iscsid[696]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:26:24.044034 iscsid[696]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:26:24.044034 iscsid[696]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:26:24.044034 iscsid[696]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:26:24.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:23.971566 systemd[1]: Reached target network.target. Dec 13 14:26:24.165045 ignition[662]: Ignition 2.14.0 Dec 13 14:26:23.980013 systemd-networkd[686]: eth0: DHCPv4 address 10.128.0.8/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:26:24.165058 ignition[662]: Stage: fetch-offline Dec 13 14:26:23.998167 systemd[1]: Starting iscsiuio.service... Dec 13 14:26:24.165132 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:24.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.007802 systemd[1]: Started iscsiuio.service. Dec 13 14:26:24.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.165170 ignition[662]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:24.020233 systemd[1]: Starting iscsid.service... Dec 13 14:26:24.187417 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:24.051291 systemd[1]: Started iscsid.service. Dec 13 14:26:24.187611 ignition[662]: parsed url from cmdline: "" Dec 13 14:26:24.063530 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:26:24.187618 ignition[662]: no config URL provided Dec 13 14:26:24.101451 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:26:24.187626 ignition[662]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:26:24.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.137387 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:26:24.187638 ignition[662]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:26:24.148206 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:26:24.187649 ignition[662]: failed to fetch config: resource requires networking Dec 13 14:26:24.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.193098 systemd[1]: Reached target remote-fs.target. Dec 13 14:26:24.187799 ignition[662]: Ignition finished successfully Dec 13 14:26:24.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.207165 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:26:24.279969 ignition[710]: Ignition 2.14.0 Dec 13 14:26:24.233472 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:26:24.279977 ignition[710]: Stage: fetch Dec 13 14:26:24.248388 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:26:24.280113 ignition[710]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:24.267482 systemd[1]: Starting ignition-fetch.service... Dec 13 14:26:24.280144 ignition[710]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:24.300269 unknown[710]: fetched base config from "system" Dec 13 14:26:24.291133 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:24.300280 unknown[710]: fetched base config from "system" Dec 13 14:26:24.291319 ignition[710]: parsed url from cmdline: "" Dec 13 14:26:24.300290 unknown[710]: fetched user config from "gcp" Dec 13 14:26:24.291326 ignition[710]: no config URL provided Dec 13 14:26:24.320577 systemd[1]: Finished ignition-fetch.service. Dec 13 14:26:24.291336 ignition[710]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:26:24.328682 systemd[1]: Starting ignition-kargs.service... Dec 13 14:26:24.291347 ignition[710]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:26:24.362429 systemd[1]: Finished ignition-kargs.service. Dec 13 14:26:24.291382 ignition[710]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:26:24.379579 systemd[1]: Starting ignition-disks.service... Dec 13 14:26:24.297066 ignition[710]: GET result: OK Dec 13 14:26:24.399765 systemd[1]: Finished ignition-disks.service. Dec 13 14:26:24.297147 ignition[710]: parsing config with SHA512: a44110217bf8e113766f2a262de1a51f1eda4ffac817b841dca9b36a1c87032143ee998ef675ba5e080a49e88e7dce2005b5eebe300350c2690d4ece55f0cc56 Dec 13 14:26:24.411298 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:26:24.301084 ignition[710]: fetch: fetch complete Dec 13 14:26:24.426072 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:26:24.301091 ignition[710]: fetch: fetch passed Dec 13 14:26:24.442142 systemd[1]: Reached target local-fs.target. Dec 13 14:26:24.301145 ignition[710]: Ignition finished successfully Dec 13 14:26:24.449195 systemd[1]: Reached target sysinit.target. Dec 13 14:26:24.343655 ignition[716]: Ignition 2.14.0 Dec 13 14:26:24.471140 systemd[1]: Reached target basic.target. Dec 13 14:26:24.343665 ignition[716]: Stage: kargs Dec 13 14:26:24.478415 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:26:24.343841 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:24.343871 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:24.351181 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:24.352284 ignition[716]: kargs: kargs passed Dec 13 14:26:24.352341 ignition[716]: Ignition finished successfully Dec 13 14:26:24.390532 ignition[722]: Ignition 2.14.0 Dec 13 14:26:24.390543 ignition[722]: Stage: disks Dec 13 14:26:24.390668 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:24.390698 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:24.397583 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:24.398742 ignition[722]: disks: disks passed Dec 13 14:26:24.398787 ignition[722]: Ignition finished successfully Dec 13 14:26:24.525215 systemd-fsck[730]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:26:24.716844 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:26:24.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:24.726245 systemd[1]: Mounting sysroot.mount... Dec 13 14:26:24.753950 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:26:24.755176 systemd[1]: Mounted sysroot.mount. Dec 13 14:26:24.755527 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:26:24.770931 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:26:24.791560 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:26:24.791643 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:26:24.791691 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:26:24.812601 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:26:24.838076 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:26:24.860958 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (736) Dec 13 14:26:24.876912 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:26:24.876990 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:26:24.877013 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:26:24.890138 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:26:24.912106 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:26:24.912312 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:26:24.922053 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:26:24.916851 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:26:24.940151 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:26:24.958064 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:26:25.001725 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:26:25.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:25.003006 systemd[1]: Starting ignition-mount.service... Dec 13 14:26:25.025112 systemd[1]: Starting sysroot-boot.service... Dec 13 14:26:25.039600 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:26:25.039750 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:26:25.066144 ignition[802]: INFO : Ignition 2.14.0 Dec 13 14:26:25.066144 ignition[802]: INFO : Stage: mount Dec 13 14:26:25.066144 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:25.066144 ignition[802]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:25.197982 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:26:25.198171 kernel: audit: type=1130 audit(1734099985.071:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:25.198204 kernel: audit: type=1130 audit(1734099985.109:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:25.198232 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (812) Dec 13 14:26:25.198258 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:26:25.198285 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:26:25.198324 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:26:25.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:25.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:25.066665 systemd[1]: Finished sysroot-boot.service. Dec 13 14:26:25.218176 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:26:25.218239 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:25.218239 ignition[802]: INFO : mount: mount passed Dec 13 14:26:25.218239 ignition[802]: INFO : Ignition finished successfully Dec 13 14:26:25.073546 systemd[1]: Finished ignition-mount.service. Dec 13 14:26:25.112691 systemd[1]: Starting ignition-files.service... Dec 13 14:26:25.152604 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:26:25.286650 ignition[831]: INFO : Ignition 2.14.0 Dec 13 14:26:25.286650 ignition[831]: INFO : Stage: files Dec 13 14:26:25.286650 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:25.286650 ignition[831]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:25.286650 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:25.286650 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:26:25.286650 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:26:25.286650 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:26:25.286650 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:26:25.286650 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:26:25.286650 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:26:25.286650 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:26:25.286650 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:26:25.286650 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem365624394" Dec 13 14:26:25.286650 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem365624394": device or resource busy Dec 13 14:26:25.286650 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem365624394", trying btrfs: device or resource busy Dec 13 14:26:25.286650 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem365624394" Dec 13 14:26:25.286650 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem365624394" Dec 13 14:26:25.532044 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (833) Dec 13 14:26:25.213994 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem365624394" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem365624394" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960299723" Dec 13 14:26:25.541069 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960299723": device or resource busy Dec 13 14:26:25.541069 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3960299723", trying btrfs: device or resource busy Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960299723" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3960299723" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem3960299723" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem3960299723" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:26:25.541069 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:26:25.265833 unknown[831]: wrote ssh authorized keys file for user: core Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830758536" Dec 13 14:26:25.807081 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830758536": device or resource busy Dec 13 14:26:25.807081 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3830758536", trying btrfs: device or resource busy Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830758536" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3830758536" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3830758536" Dec 13 14:26:25.807081 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3830758536" Dec 13 14:26:25.353112 systemd-networkd[686]: eth0: Gained IPv6LL Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2150080241" Dec 13 14:26:26.058048 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2150080241": device or resource busy Dec 13 14:26:26.058048 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2150080241", trying btrfs: device or resource busy Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2150080241" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2150080241" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem2150080241" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem2150080241" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:26:26.058048 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): GET result: OK Dec 13 14:26:26.475101 kernel: audit: type=1130 audit(1734099986.153:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.475157 kernel: audit: type=1130 audit(1734099986.255:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.475202 kernel: audit: type=1130 audit(1734099986.299:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.475227 kernel: audit: type=1131 audit(1734099986.299:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.475251 kernel: audit: type=1130 audit(1734099986.415:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.475268 kernel: audit: type=1131 audit(1734099986.415:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.475516 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(18): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(18): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(19): [started] processing unit "oem-gce.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(19): [finished] processing unit "oem-gce.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1a): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1a): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1b): [started] processing unit "containerd.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1b): op(1c): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1b): op(1c): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1b): [finished] processing unit "containerd.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1d): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1d): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1e): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1e): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:26:26.475516 ignition[831]: INFO : files: op(1f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:26:26.475516 ignition[831]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:26:26.475516 ignition[831]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:26:26.475516 ignition[831]: INFO : files: files passed Dec 13 14:26:26.475516 ignition[831]: INFO : Ignition finished successfully Dec 13 14:26:26.923073 kernel: audit: type=1130 audit(1734099986.535:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.923129 kernel: audit: type=1131 audit(1734099986.640:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.127658 systemd[1]: Finished ignition-files.service. Dec 13 14:26:26.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.165479 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:26:26.956074 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:26:26.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.196263 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:26:26.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.197356 systemd[1]: Starting ignition-quench.service... Dec 13 14:26:27.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.242538 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:26:26.257725 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:26:26.257929 systemd[1]: Finished ignition-quench.service. Dec 13 14:26:27.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.075248 iscsid[696]: iscsid shutting down. Dec 13 14:26:27.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.301460 systemd[1]: Reached target ignition-complete.target. Dec 13 14:26:27.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.366319 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:26:27.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.121189 ignition[869]: INFO : Ignition 2.14.0 Dec 13 14:26:27.121189 ignition[869]: INFO : Stage: umount Dec 13 14:26:27.121189 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:26:27.121189 ignition[869]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:26:27.121189 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:26:27.121189 ignition[869]: INFO : umount: umount passed Dec 13 14:26:27.121189 ignition[869]: INFO : Ignition finished successfully Dec 13 14:26:27.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.411858 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:26:26.412040 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:26:26.417421 systemd[1]: Reached target initrd-fs.target. Dec 13 14:26:26.483220 systemd[1]: Reached target initrd.target. Dec 13 14:26:27.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.501304 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:26:27.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.502618 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:26:26.519448 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:26:27.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.538728 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:26:27.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.582974 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:26:26.589373 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:26:26.607424 systemd[1]: Stopped target timers.target. Dec 13 14:26:26.625398 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:26:26.625590 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:26:27.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.642686 systemd[1]: Stopped target initrd.target. Dec 13 14:26:27.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.435000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:26:26.687445 systemd[1]: Stopped target basic.target. Dec 13 14:26:26.729262 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:26:26.750273 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:26:27.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.771274 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:26:27.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.793285 systemd[1]: Stopped target remote-fs.target. Dec 13 14:26:27.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.815345 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:26:26.837360 systemd[1]: Stopped target sysinit.target. Dec 13 14:26:27.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.859319 systemd[1]: Stopped target local-fs.target. Dec 13 14:26:26.874396 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:26:26.895405 systemd[1]: Stopped target swap.target. Dec 13 14:26:27.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.909362 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:26:27.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.909561 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:26:27.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.931522 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:26:26.946255 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:26:26.946452 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:26:27.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.964428 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:26:27.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.964598 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:26:27.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.988412 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:26:27.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:26.988579 systemd[1]: Stopped ignition-files.service. Dec 13 14:26:27.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:27.014812 systemd[1]: Stopping ignition-mount.service... Dec 13 14:26:27.035388 systemd[1]: Stopping iscsid.service... Dec 13 14:26:27.043375 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:26:27.757000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:26:27.757000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:26:27.758000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:26:27.758000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:26:27.758000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:26:27.058057 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:26:27.058362 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:26:27.790074 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Dec 13 14:26:27.068365 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:26:27.068588 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:26:27.087173 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:26:27.088259 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:26:27.088372 systemd[1]: Stopped iscsid.service. Dec 13 14:26:27.097821 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:26:27.097968 systemd[1]: Stopped ignition-mount.service. Dec 13 14:26:27.113749 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:26:27.113861 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:26:27.128817 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:26:27.128994 systemd[1]: Stopped ignition-disks.service. Dec 13 14:26:27.135254 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:26:27.135318 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:26:27.148301 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:26:27.148363 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:26:27.165323 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:26:27.165388 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:26:27.191346 systemd[1]: Stopped target paths.target. Dec 13 14:26:27.208228 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:26:27.211994 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:26:27.221216 systemd[1]: Stopped target slices.target. Dec 13 14:26:27.243141 systemd[1]: Stopped target sockets.target. Dec 13 14:26:27.259215 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:26:27.259273 systemd[1]: Closed iscsid.socket. Dec 13 14:26:27.273218 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:26:27.273291 systemd[1]: Stopped ignition-setup.service. Dec 13 14:26:27.280310 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:26:27.280376 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:26:27.301347 systemd[1]: Stopping iscsiuio.service... Dec 13 14:26:27.319676 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:26:27.319830 systemd[1]: Stopped iscsiuio.service. Dec 13 14:26:27.327587 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:26:27.327699 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:26:27.349143 systemd[1]: Stopped target network.target. Dec 13 14:26:27.363092 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:26:27.363175 systemd[1]: Closed iscsiuio.socket. Dec 13 14:26:27.377272 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:26:27.380991 systemd-networkd[686]: eth0: DHCPv6 lease lost Dec 13 14:26:27.386338 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:26:27.405466 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:26:27.405602 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:26:27.413863 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:26:27.414028 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:26:27.437035 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:26:27.437089 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:26:27.452191 systemd[1]: Stopping network-cleanup.service... Dec 13 14:26:27.464999 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:26:27.465105 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:26:27.481165 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:26:27.481233 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:26:27.497247 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:26:27.497306 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:26:27.513259 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:26:27.528604 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:26:27.529334 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:26:27.529480 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:26:27.544604 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:26:27.544712 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:26:27.558106 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:26:27.558172 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:26:27.573076 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:26:27.573168 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:26:27.588181 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:26:27.588250 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:26:27.603161 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:26:27.603236 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:26:27.620156 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:26:27.641172 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:26:27.641265 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:26:27.649366 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:26:27.649424 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:26:27.671234 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:26:27.671311 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:26:27.690750 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:26:27.691406 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:26:27.691517 systemd[1]: Stopped network-cleanup.service. Dec 13 14:26:27.706504 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:26:27.706613 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:26:27.723357 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:26:27.739358 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:26:27.754549 systemd[1]: Switching root. Dec 13 14:26:27.803447 systemd-journald[189]: Journal stopped Dec 13 14:26:32.400570 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:26:32.400673 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:26:32.400698 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:26:32.400730 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:26:32.400752 kernel: SELinux: policy capability open_perms=1 Dec 13 14:26:32.400773 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:26:32.400801 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:26:32.400823 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:26:32.400855 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:26:32.400881 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:26:32.400916 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:26:32.400948 systemd[1]: Successfully loaded SELinux policy in 109.593ms. Dec 13 14:26:32.400988 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.248ms. Dec 13 14:26:32.401014 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:26:32.401038 systemd[1]: Detected virtualization kvm. Dec 13 14:26:32.401061 systemd[1]: Detected architecture x86-64. Dec 13 14:26:32.401084 systemd[1]: Detected first boot. Dec 13 14:26:32.401108 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:26:32.401136 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:26:32.401159 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:26:32.401190 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:26:32.401215 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:26:32.401240 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:26:32.401271 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:26:32.401295 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:26:32.401322 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:26:32.401347 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:26:32.401370 systemd[1]: Created slice system-getty.slice. Dec 13 14:26:32.401393 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:26:32.401417 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:26:32.401441 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:26:32.401466 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:26:32.401488 systemd[1]: Created slice user.slice. Dec 13 14:26:32.401517 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:26:32.401540 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:26:32.401565 systemd[1]: Set up automount boot.automount. Dec 13 14:26:32.401588 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:26:32.401611 systemd[1]: Reached target integritysetup.target. Dec 13 14:26:32.401635 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:26:32.401659 systemd[1]: Reached target remote-fs.target. Dec 13 14:26:32.401681 systemd[1]: Reached target slices.target. Dec 13 14:26:32.401705 systemd[1]: Reached target swap.target. Dec 13 14:26:32.401732 systemd[1]: Reached target torcx.target. Dec 13 14:26:32.401755 systemd[1]: Reached target veritysetup.target. Dec 13 14:26:32.401778 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:26:32.401800 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:26:32.401824 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 14:26:32.401847 kernel: audit: type=1400 audit(1734099991.922:90): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:26:32.401869 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:26:32.401905 kernel: audit: type=1335 audit(1734099991.922:91): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 14:26:32.401932 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:26:32.401955 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:26:32.401978 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:26:32.402002 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:26:32.402027 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:26:32.402051 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:26:32.402074 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:26:32.402098 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:26:32.402121 systemd[1]: Mounting media.mount... Dec 13 14:26:32.402148 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:32.402177 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:26:32.402201 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:26:32.402226 systemd[1]: Mounting tmp.mount... Dec 13 14:26:32.402249 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:26:32.402272 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:26:32.402296 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:26:32.402320 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:26:32.402344 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:26:32.402370 systemd[1]: Starting modprobe@drm.service... Dec 13 14:26:32.402397 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:26:32.402421 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:26:32.402445 systemd[1]: Starting modprobe@loop.service... Dec 13 14:26:32.402469 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:26:32.402493 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 14:26:32.402516 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 14:26:32.402540 kernel: fuse: init (API version 7.34) Dec 13 14:26:32.402562 systemd[1]: Starting systemd-journald.service... Dec 13 14:26:32.402588 kernel: loop: module loaded Dec 13 14:26:32.402611 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:26:32.402634 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:26:32.402657 kernel: audit: type=1305 audit(1734099992.396:92): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:26:32.402683 systemd-journald[1029]: Journal started Dec 13 14:26:32.402769 systemd-journald[1029]: Runtime Journal (/run/log/journal/752bf9228a4bd0f5ced7bc0b85e91de4) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:26:31.922000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:26:31.922000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 14:26:32.396000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:26:32.396000 audit[1029]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd83911f90 a2=4000 a3=7ffd8391202c items=0 ppid=1 pid=1029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.452422 kernel: audit: type=1300 audit(1734099992.396:92): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd83911f90 a2=4000 a3=7ffd8391202c items=0 ppid=1 pid=1029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:32.452525 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:26:32.452564 kernel: audit: type=1327 audit(1734099992.396:92): proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:26:32.396000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:26:32.477941 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:26:32.496923 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:32.505918 systemd[1]: Started systemd-journald.service. Dec 13 14:26:32.516176 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:26:32.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.540953 kernel: audit: type=1130 audit(1734099992.512:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.545283 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:26:32.552226 systemd[1]: Mounted media.mount. Dec 13 14:26:32.559170 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:26:32.568159 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:26:32.577179 systemd[1]: Mounted tmp.mount. Dec 13 14:26:32.584355 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:26:32.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.593518 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:26:32.615931 kernel: audit: type=1130 audit(1734099992.591:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.623528 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:26:32.623825 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:26:32.645987 kernel: audit: type=1130 audit(1734099992.621:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.654819 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:26:32.655245 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:26:32.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.698696 kernel: audit: type=1130 audit(1734099992.652:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.698813 kernel: audit: type=1131 audit(1734099992.652:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.707585 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:26:32.707839 systemd[1]: Finished modprobe@drm.service. Dec 13 14:26:32.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.716614 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:26:32.716917 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:26:32.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.725573 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:26:32.725918 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:26:32.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.734529 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:26:32.734841 systemd[1]: Finished modprobe@loop.service. Dec 13 14:26:32.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.743651 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:26:32.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.752549 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:26:32.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.761574 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:26:32.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.770531 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:26:32.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.779655 systemd[1]: Reached target network-pre.target. Dec 13 14:26:32.789770 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:26:32.799957 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:26:32.807065 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:26:32.810592 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:26:32.819825 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:26:32.829085 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:26:32.830178 systemd-journald[1029]: Time spent on flushing to /var/log/journal/752bf9228a4bd0f5ced7bc0b85e91de4 is 93.048ms for 1081 entries. Dec 13 14:26:32.830178 systemd-journald[1029]: System Journal (/var/log/journal/752bf9228a4bd0f5ced7bc0b85e91de4) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:26:32.954257 systemd-journald[1029]: Received client request to flush runtime journal. Dec 13 14:26:32.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:32.831140 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:26:32.845084 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:26:32.847031 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:26:32.855840 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:26:32.864931 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:26:32.957283 udevadm[1053]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:26:32.875776 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:26:32.884163 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:26:32.893478 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:26:32.902546 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:26:32.914959 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:26:32.929488 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:26:32.940045 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:26:32.955732 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:26:32.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:33.004598 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:26:33.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:33.539776 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:26:33.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:33.549813 systemd[1]: Starting systemd-udevd.service... Dec 13 14:26:33.574198 systemd-udevd[1063]: Using default interface naming scheme 'v252'. Dec 13 14:26:33.619465 systemd[1]: Started systemd-udevd.service. Dec 13 14:26:33.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:33.631676 systemd[1]: Starting systemd-networkd.service... Dec 13 14:26:33.646696 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:26:33.686761 systemd[1]: Found device dev-ttyS0.device. Dec 13 14:26:33.745130 systemd[1]: Started systemd-userdbd.service. Dec 13 14:26:33.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:33.802919 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:26:33.878943 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:26:33.893000 audit[1067]: AVC avc: denied { confidentiality } for pid=1067 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:26:33.921506 systemd-networkd[1077]: lo: Link UP Dec 13 14:26:33.921523 systemd-networkd[1077]: lo: Gained carrier Dec 13 14:26:33.922319 systemd-networkd[1077]: Enumeration completed Dec 13 14:26:33.922516 systemd[1]: Started systemd-networkd.service. Dec 13 14:26:33.924083 systemd-networkd[1077]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:26:33.926193 systemd-networkd[1077]: eth0: Link UP Dec 13 14:26:33.926342 systemd-networkd[1077]: eth0: Gained carrier Dec 13 14:26:33.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:33.893000 audit[1067]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558387e7f0f0 a1=337fc a2=7fc568c35bc5 a3=5 items=110 ppid=1063 pid=1067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:33.893000 audit: CWD cwd="/" Dec 13 14:26:33.893000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=1 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=2 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=3 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=4 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=5 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=6 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=7 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=8 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=9 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=10 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=11 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=12 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=13 name=(null) inode=14598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=14 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=15 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=16 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=17 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=18 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=19 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=20 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=21 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=22 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=23 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=24 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=25 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=26 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=27 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=28 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=29 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=30 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=31 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=32 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=33 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=34 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=35 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=36 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=37 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=38 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=39 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=40 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=41 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=42 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=43 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=44 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=45 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=46 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=47 name=(null) inode=14615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=48 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=49 name=(null) inode=14616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=50 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.943103 systemd-networkd[1077]: eth0: DHCPv4 address 10.128.0.8/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:26:33.893000 audit: PATH item=51 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=52 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=53 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=55 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=56 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=57 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=58 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=59 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.950931 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Dec 13 14:26:33.893000 audit: PATH item=60 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=61 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=62 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=63 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=64 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=65 name=(null) inode=14624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=66 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=67 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=68 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=69 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=70 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=71 name=(null) inode=14627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=72 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=73 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=74 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=75 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=76 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=77 name=(null) inode=14630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=78 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=79 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=80 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=81 name=(null) inode=14632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=82 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=83 name=(null) inode=14633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=84 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=85 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=86 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=87 name=(null) inode=14635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=88 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=89 name=(null) inode=14636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=90 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=91 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=92 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=93 name=(null) inode=14638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=94 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=95 name=(null) inode=14639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=96 name=(null) inode=14619 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=97 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=98 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=99 name=(null) inode=14641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=100 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=101 name=(null) inode=14642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=102 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=103 name=(null) inode=14643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=104 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=105 name=(null) inode=14644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=106 name=(null) inode=14640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=107 name=(null) inode=14645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PATH item=109 name=(null) inode=14646 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:33.893000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:26:33.994921 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1080) Dec 13 14:26:34.005950 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:26:34.034608 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:26:34.034724 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 14:26:34.062520 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Dec 13 14:26:34.062910 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:26:34.072956 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:26:34.091588 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:26:34.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.101877 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:26:34.128122 lvm[1101]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:26:34.161487 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:26:34.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.170409 systemd[1]: Reached target cryptsetup.target. Dec 13 14:26:34.180592 systemd[1]: Starting lvm2-activation.service... Dec 13 14:26:34.186649 lvm[1103]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:26:34.213521 systemd[1]: Finished lvm2-activation.service. Dec 13 14:26:34.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.222444 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:26:34.231041 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:26:34.231089 systemd[1]: Reached target local-fs.target. Dec 13 14:26:34.239027 systemd[1]: Reached target machines.target. Dec 13 14:26:34.248637 systemd[1]: Starting ldconfig.service... Dec 13 14:26:34.256842 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:26:34.256944 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:34.258823 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:26:34.267594 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:26:34.278451 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:26:34.288597 systemd[1]: Starting systemd-sysext.service... Dec 13 14:26:34.296657 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1106 (bootctl) Dec 13 14:26:34.298642 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:26:34.314379 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:26:34.323221 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:26:34.324678 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:26:34.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.352519 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:26:34.353947 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:26:34.458463 systemd-fsck[1121]: fsck.fat 4.2 (2021-01-31) Dec 13 14:26:34.458463 systemd-fsck[1121]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:26:34.461476 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:26:34.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.472772 systemd[1]: Mounting boot.mount... Dec 13 14:26:34.543634 systemd[1]: Mounted boot.mount. Dec 13 14:26:34.567023 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:26:34.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.656169 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:26:34.658056 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:26:34.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.675915 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:26:34.699938 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:26:34.723757 (sd-sysext)[1130]: Using extensions 'kubernetes'. Dec 13 14:26:34.724438 (sd-sysext)[1130]: Merged extensions into '/usr'. Dec 13 14:26:34.751660 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:34.754332 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:26:34.760189 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:26:34.762501 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:26:34.772109 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:26:34.781101 systemd[1]: Starting modprobe@loop.service... Dec 13 14:26:34.789149 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:26:34.789411 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:34.789634 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:34.794972 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:26:34.802656 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:26:34.802955 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:26:34.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.812246 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:26:34.812499 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:26:34.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.822840 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:26:34.823159 systemd[1]: Finished modprobe@loop.service. Dec 13 14:26:34.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.832734 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:26:34.832909 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:26:34.834286 systemd[1]: Finished systemd-sysext.service. Dec 13 14:26:34.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:34.845857 systemd[1]: Starting ensure-sysext.service... Dec 13 14:26:34.854600 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:26:34.866697 systemd[1]: Reloading. Dec 13 14:26:34.874628 systemd-tmpfiles[1144]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:26:34.878292 systemd-tmpfiles[1144]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:26:34.886133 systemd-tmpfiles[1144]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:26:34.904928 ldconfig[1105]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:26:34.994799 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:26:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:26:34.994867 /usr/lib/systemd/system-generators/torcx-generator[1165]: time="2024-12-13T14:26:34Z" level=info msg="torcx already run" Dec 13 14:26:35.172077 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:26:35.172178 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:26:35.198514 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:26:35.274181 systemd[1]: Finished ldconfig.service. Dec 13 14:26:35.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:35.283940 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:26:35.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:35.297161 systemd[1]: Starting audit-rules.service... Dec 13 14:26:35.306084 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:26:35.316387 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:26:35.327427 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:26:35.338967 systemd[1]: Starting systemd-resolved.service... Dec 13 14:26:35.349261 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:26:35.358606 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:26:35.375000 audit[1243]: SYSTEM_BOOT pid=1243 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:26:35.378713 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:26:35.377000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:26:35.379758 augenrules[1248]: No rules Dec 13 14:26:35.377000 audit[1248]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5d680250 a2=420 a3=0 items=0 ppid=1216 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:35.377000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:26:35.387970 systemd[1]: Finished audit-rules.service. Dec 13 14:26:35.395474 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:26:35.395719 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:26:35.404765 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:26:35.422390 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:26:35.434094 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:35.434611 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.440041 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:26:35.449199 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:26:35.458091 systemd[1]: Starting modprobe@loop.service... Dec 13 14:26:35.465506 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:26:35.472821 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.473101 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:35.479557 systemd[1]: Starting systemd-update-done.service... Dec 13 14:26:35.487021 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:26:35.487217 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:35.489804 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:26:35.490092 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:26:35.491004 enable-oslogin[1261]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:26:35.498750 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:26:35.499061 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:26:35.507840 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:26:35.508127 systemd[1]: Finished modprobe@loop.service. Dec 13 14:26:35.516995 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:26:35.517343 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:26:35.526839 systemd[1]: Finished systemd-update-done.service. Dec 13 14:26:35.529062 systemd-networkd[1077]: eth0: Gained IPv6LL Dec 13 14:26:35.535640 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:26:35.535849 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.541386 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:35.541953 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.546296 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:26:35.555142 systemd[1]: Starting modprobe@drm.service... Dec 13 14:26:35.564102 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:26:35.573224 systemd[1]: Starting modprobe@loop.service... Dec 13 14:26:35.582419 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:26:35.591163 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.591435 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:35.593805 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:26:35.596991 enable-oslogin[1276]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:26:35.602106 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:26:35.602367 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:26:35.605003 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:26:35.605276 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:26:35.614796 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:26:35.615089 systemd[1]: Finished modprobe@drm.service. Dec 13 14:26:35.624725 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:26:35.625004 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:26:35.635753 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:26:35.636038 systemd[1]: Finished modprobe@loop.service. Dec 13 14:26:35.645756 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:26:35.646159 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:26:35.648856 systemd-resolved[1232]: Positive Trust Anchors: Dec 13 14:26:35.648879 systemd-resolved[1232]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:26:35.648967 systemd-resolved[1232]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:26:35.655816 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:26:35.660463 systemd-resolved[1232]: Defaulting to hostname 'linux'. Dec 13 14:26:35.666529 systemd[1]: Started systemd-resolved.service. Dec 13 14:26:35.675727 systemd[1]: Reached target network.target. Dec 13 14:26:35.680190 systemd-timesyncd[1239]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:26:35.680263 systemd-timesyncd[1239]: Initial clock synchronization to Fri 2024-12-13 14:26:35.631765 UTC. Dec 13 14:26:35.684171 systemd[1]: Reached target network-online.target. Dec 13 14:26:35.693152 systemd[1]: Reached target nss-lookup.target. Dec 13 14:26:35.702211 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:26:35.702417 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.703189 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:26:35.713385 systemd[1]: Reached target sysinit.target. Dec 13 14:26:35.722199 systemd[1]: Started motdgen.path. Dec 13 14:26:35.729103 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:26:35.739041 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:26:35.747031 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:26:35.747105 systemd[1]: Reached target paths.target. Dec 13 14:26:35.754028 systemd[1]: Reached target time-set.target. Dec 13 14:26:35.762284 systemd[1]: Started logrotate.timer. Dec 13 14:26:35.769149 systemd[1]: Started mdadm.timer. Dec 13 14:26:35.776034 systemd[1]: Reached target timers.target. Dec 13 14:26:35.783513 systemd[1]: Listening on dbus.socket. Dec 13 14:26:35.792551 systemd[1]: Starting docker.socket... Dec 13 14:26:35.802274 systemd[1]: Listening on sshd.socket. Dec 13 14:26:35.809168 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:35.810112 systemd[1]: Finished ensure-sysext.service. Dec 13 14:26:35.818245 systemd[1]: Listening on docker.socket. Dec 13 14:26:35.826034 systemd[1]: Reached target sockets.target. Dec 13 14:26:35.834066 systemd[1]: Reached target basic.target. Dec 13 14:26:35.841297 systemd[1]: System is tainted: cgroupsv1 Dec 13 14:26:35.841383 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.841422 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:26:35.843101 systemd[1]: Starting containerd.service... Dec 13 14:26:35.851556 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:26:35.862026 systemd[1]: Starting dbus.service... Dec 13 14:26:35.870669 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:26:35.879761 systemd[1]: Starting extend-filesystems.service... Dec 13 14:26:35.887019 jq[1289]: false Dec 13 14:26:35.887048 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:26:35.889404 systemd[1]: Starting kubelet.service... Dec 13 14:26:35.899640 systemd[1]: Starting motdgen.service... Dec 13 14:26:35.908829 systemd[1]: Starting oem-gce.service... Dec 13 14:26:35.918568 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:26:35.927990 systemd[1]: Starting sshd-keygen.service... Dec 13 14:26:35.938829 systemd[1]: Starting systemd-logind.service... Dec 13 14:26:35.946052 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:35.946181 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:26:35.948316 systemd[1]: Starting update-engine.service... Dec 13 14:26:35.956745 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:26:35.968540 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:26:35.968980 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:26:35.973685 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:26:35.975187 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:26:35.980592 jq[1315]: true Dec 13 14:26:36.012635 extend-filesystems[1290]: Found loop1 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda1 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda2 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda3 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found usr Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda4 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda6 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda7 Dec 13 14:26:36.020136 extend-filesystems[1290]: Found sda9 Dec 13 14:26:36.110115 mkfs.ext4[1326]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:26:36.110115 mkfs.ext4[1326]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:26:36.110115 mkfs.ext4[1326]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:26:36.110115 mkfs.ext4[1326]: Filesystem UUID: a5889161-9a23-4fb8-a288-83db89fdf870 Dec 13 14:26:36.110115 mkfs.ext4[1326]: Superblock backups stored on blocks: Dec 13 14:26:36.110115 mkfs.ext4[1326]: 32768, 98304, 163840, 229376 Dec 13 14:26:36.110115 mkfs.ext4[1326]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:26:36.110115 mkfs.ext4[1326]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:26:36.110115 mkfs.ext4[1326]: Creating journal (8192 blocks): done Dec 13 14:26:36.110115 mkfs.ext4[1326]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:26:36.058051 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:26:36.110762 extend-filesystems[1290]: Checking size of /dev/sda9 Dec 13 14:26:36.110762 extend-filesystems[1290]: Resized partition /dev/sda9 Dec 13 14:26:36.129343 jq[1324]: true Dec 13 14:26:36.058443 systemd[1]: Finished motdgen.service. Dec 13 14:26:36.130622 umount[1343]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:26:36.135482 dbus-daemon[1288]: [system] SELinux support is enabled Dec 13 14:26:36.136190 systemd[1]: Started dbus.service. Dec 13 14:26:36.146761 extend-filesystems[1347]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:26:36.196421 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:26:36.196486 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:26:36.146623 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:26:36.150556 dbus-daemon[1288]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1077 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:26:36.196696 update_engine[1313]: I1213 14:26:36.147105 1313 main.cc:92] Flatcar Update Engine starting Dec 13 14:26:36.196696 update_engine[1313]: I1213 14:26:36.157033 1313 update_check_scheduler.cc:74] Next update check in 8m22s Dec 13 14:26:36.146659 systemd[1]: Reached target system-config.target. Dec 13 14:26:36.177823 dbus-daemon[1288]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:26:36.156111 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:26:36.156151 systemd[1]: Reached target user-config.target. Dec 13 14:26:36.177100 systemd[1]: Started update-engine.service. Dec 13 14:26:36.209568 systemd[1]: Started locksmithd.service. Dec 13 14:26:36.216963 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:26:36.231000 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:26:36.237217 extend-filesystems[1347]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:26:36.237217 extend-filesystems[1347]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:26:36.237217 extend-filesystems[1347]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:26:36.286094 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:26:36.239050 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:26:36.286261 bash[1365]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:26:36.286393 extend-filesystems[1290]: Resized filesystem in /dev/sda9 Dec 13 14:26:36.239448 systemd[1]: Finished extend-filesystems.service. Dec 13 14:26:36.271560 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:26:36.335433 coreos-metadata[1287]: Dec 13 14:26:36.334 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:26:36.339411 coreos-metadata[1287]: Dec 13 14:26:36.338 INFO Fetch failed with 404: resource not found Dec 13 14:26:36.339411 coreos-metadata[1287]: Dec 13 14:26:36.338 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:26:36.339411 coreos-metadata[1287]: Dec 13 14:26:36.338 INFO Fetch successful Dec 13 14:26:36.339411 coreos-metadata[1287]: Dec 13 14:26:36.338 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:26:36.339908 env[1325]: time="2024-12-13T14:26:36.339826966Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:26:36.340328 coreos-metadata[1287]: Dec 13 14:26:36.340 INFO Fetch failed with 404: resource not found Dec 13 14:26:36.340328 coreos-metadata[1287]: Dec 13 14:26:36.340 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:26:36.342410 coreos-metadata[1287]: Dec 13 14:26:36.340 INFO Fetch failed with 404: resource not found Dec 13 14:26:36.342410 coreos-metadata[1287]: Dec 13 14:26:36.340 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:26:36.342410 coreos-metadata[1287]: Dec 13 14:26:36.342 INFO Fetch successful Dec 13 14:26:36.345336 unknown[1287]: wrote ssh authorized keys file for user: core Dec 13 14:26:36.416528 update-ssh-keys[1377]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:26:36.417327 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:26:36.462171 dbus-daemon[1288]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:26:36.462373 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:26:36.463354 dbus-daemon[1288]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1363 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:26:36.477755 systemd[1]: Starting polkit.service... Dec 13 14:26:36.521657 systemd-logind[1308]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:26:36.522194 systemd-logind[1308]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 14:26:36.522336 systemd-logind[1308]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:26:36.524564 systemd-logind[1308]: New seat seat0. Dec 13 14:26:36.530209 systemd[1]: Started systemd-logind.service. Dec 13 14:26:36.571403 polkitd[1382]: Started polkitd version 121 Dec 13 14:26:36.598199 polkitd[1382]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:26:36.598288 polkitd[1382]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:26:36.606142 env[1325]: time="2024-12-13T14:26:36.606082296Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:26:36.606290 env[1325]: time="2024-12-13T14:26:36.606252277Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:36.606564 polkitd[1382]: Finished loading, compiling and executing 2 rules Dec 13 14:26:36.608698 dbus-daemon[1288]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:26:36.608945 systemd[1]: Started polkit.service. Dec 13 14:26:36.609473 polkitd[1382]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:26:36.613227 env[1325]: time="2024-12-13T14:26:36.613175618Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:36.613340 env[1325]: time="2024-12-13T14:26:36.613228538Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:36.618416 env[1325]: time="2024-12-13T14:26:36.618375900Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:36.618580 env[1325]: time="2024-12-13T14:26:36.618416629Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:36.618580 env[1325]: time="2024-12-13T14:26:36.618439225Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:26:36.618580 env[1325]: time="2024-12-13T14:26:36.618456458Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:36.618726 env[1325]: time="2024-12-13T14:26:36.618679713Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:36.619194 env[1325]: time="2024-12-13T14:26:36.619049410Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:36.622344 env[1325]: time="2024-12-13T14:26:36.619391449Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:36.622344 env[1325]: time="2024-12-13T14:26:36.622241336Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:26:36.622489 env[1325]: time="2024-12-13T14:26:36.622349648Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:26:36.622489 env[1325]: time="2024-12-13T14:26:36.622373770Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:26:36.632857 env[1325]: time="2024-12-13T14:26:36.632632196Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:26:36.632857 env[1325]: time="2024-12-13T14:26:36.632713249Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:26:36.632857 env[1325]: time="2024-12-13T14:26:36.632740608Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:26:36.632857 env[1325]: time="2024-12-13T14:26:36.632812939Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.631989 systemd-hostnamed[1363]: Hostname set to (transient) Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.632839392Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.632967529Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.632994238Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633037416Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633164821Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633190271Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633231709Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633255775Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633443785Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:26:36.633697 env[1325]: time="2024-12-13T14:26:36.633637911Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:26:36.634420 env[1325]: time="2024-12-13T14:26:36.634387518Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:26:36.634513 env[1325]: time="2024-12-13T14:26:36.634459894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.634513 env[1325]: time="2024-12-13T14:26:36.634487724Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:26:36.634634 env[1325]: time="2024-12-13T14:26:36.634611878Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.634794 env[1325]: time="2024-12-13T14:26:36.634643829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.634794 env[1325]: time="2024-12-13T14:26:36.634772562Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.634929 env[1325]: time="2024-12-13T14:26:36.634794521Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.634929 env[1325]: time="2024-12-13T14:26:36.634833060Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.634929 env[1325]: time="2024-12-13T14:26:36.634857863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.634878344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.634953767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.634983168Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635225192Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635251863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635292045Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635312467Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635355376Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635375199Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635450629Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:26:36.640034 env[1325]: time="2024-12-13T14:26:36.635517318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:26:36.635821 systemd-resolved[1232]: System hostname changed to 'ci-3510-3-6-df34f14dda425a66390d.c.flatcar-212911.internal'. Dec 13 14:26:36.640611 env[1325]: time="2024-12-13T14:26:36.635980678Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:26:36.640611 env[1325]: time="2024-12-13T14:26:36.636070688Z" level=info msg="Connect containerd service" Dec 13 14:26:36.640611 env[1325]: time="2024-12-13T14:26:36.636111760Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.640940291Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641112143Z" level=info msg="Start subscribing containerd event" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641170667Z" level=info msg="Start recovering state" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641262658Z" level=info msg="Start event monitor" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641297960Z" level=info msg="Start snapshots syncer" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641314452Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641327580Z" level=info msg="Start streaming server" Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641320172Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641402810Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:26:36.646107 env[1325]: time="2024-12-13T14:26:36.641746010Z" level=info msg="containerd successfully booted in 0.349614s" Dec 13 14:26:36.641611 systemd[1]: Started containerd.service. Dec 13 14:26:37.015769 systemd[1]: Created slice system-sshd.slice. Dec 13 14:26:37.762721 locksmithd[1361]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:26:38.086260 systemd[1]: Started kubelet.service. Dec 13 14:26:39.150467 sshd_keygen[1317]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:26:39.193013 systemd[1]: Finished sshd-keygen.service. Dec 13 14:26:39.202766 systemd[1]: Starting issuegen.service... Dec 13 14:26:39.211974 systemd[1]: Started sshd@0-10.128.0.8:22-194.169.175.38:45914.service. Dec 13 14:26:39.234740 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:26:39.235135 systemd[1]: Finished issuegen.service. Dec 13 14:26:39.244753 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:26:39.263061 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:26:39.273684 systemd[1]: Started getty@tty1.service. Dec 13 14:26:39.284963 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:26:39.293702 systemd[1]: Reached target getty.target. Dec 13 14:26:39.482042 kubelet[1398]: E1213 14:26:39.481812 1398 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:26:39.484460 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:26:39.484758 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:26:39.982864 sshd[1414]: Invalid user user from 194.169.175.38 port 45914 Dec 13 14:26:40.150416 sshd[1414]: Failed password for invalid user user from 194.169.175.38 port 45914 ssh2 Dec 13 14:26:40.289827 sshd[1414]: Connection closed by invalid user user 194.169.175.38 port 45914 [preauth] Dec 13 14:26:40.291716 systemd[1]: sshd@0-10.128.0.8:22-194.169.175.38:45914.service: Deactivated successfully. Dec 13 14:26:41.604336 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:26:43.614927 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:26:43.636417 systemd-nspawn[1430]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:26:43.636417 systemd-nspawn[1430]: Press ^] three times within 1s to kill container. Dec 13 14:26:43.650937 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:26:43.727744 systemd[1]: Started oem-gce.service. Dec 13 14:26:43.735521 systemd[1]: Reached target multi-user.target. Dec 13 14:26:43.746304 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:26:43.759436 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:26:43.759781 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:26:43.772459 systemd[1]: Startup finished in 8.283s (kernel) + 15.711s (userspace) = 23.995s. Dec 13 14:26:43.784763 systemd-nspawn[1430]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:26:43.784763 systemd-nspawn[1430]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:26:43.785167 systemd-nspawn[1430]: + /usr/bin/google_instance_setup Dec 13 14:26:44.375205 instance-setup[1437]: INFO Running google_set_multiqueue. Dec 13 14:26:44.390124 instance-setup[1437]: INFO Set channels for eth0 to 2. Dec 13 14:26:44.393985 instance-setup[1437]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:26:44.395318 instance-setup[1437]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:26:44.395793 instance-setup[1437]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:26:44.398332 instance-setup[1437]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:26:44.401364 systemd[1]: Started sshd@1-10.128.0.8:22-139.178.68.195:48200.service. Dec 13 14:26:44.398480 instance-setup[1437]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:26:44.402974 instance-setup[1437]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:26:44.403134 instance-setup[1437]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:26:44.406132 instance-setup[1437]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:26:44.421481 instance-setup[1437]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:26:44.421653 instance-setup[1437]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:26:44.460176 systemd-nspawn[1430]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:26:44.709024 sshd[1458]: Accepted publickey for core from 139.178.68.195 port 48200 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:44.712338 sshd[1458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:44.734311 systemd[1]: Created slice user-500.slice. Dec 13 14:26:44.736237 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:26:44.753267 systemd-logind[1308]: New session 1 of user core. Dec 13 14:26:44.762488 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:26:44.765161 systemd[1]: Starting user@500.service... Dec 13 14:26:44.789762 (systemd)[1476]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:44.849110 startup-script[1470]: INFO Starting startup scripts. Dec 13 14:26:44.866312 startup-script[1470]: INFO No startup scripts found in metadata. Dec 13 14:26:44.866702 startup-script[1470]: INFO Finished running startup scripts. Dec 13 14:26:44.908606 systemd-nspawn[1430]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:26:44.909338 systemd-nspawn[1430]: + daemon_pids=() Dec 13 14:26:44.909566 systemd-nspawn[1430]: + for d in accounts clock_skew network Dec 13 14:26:44.910019 systemd-nspawn[1430]: + daemon_pids+=($!) Dec 13 14:26:44.910223 systemd-nspawn[1430]: + for d in accounts clock_skew network Dec 13 14:26:44.910585 systemd-nspawn[1430]: + daemon_pids+=($!) Dec 13 14:26:44.910771 systemd-nspawn[1430]: + for d in accounts clock_skew network Dec 13 14:26:44.911153 systemd-nspawn[1430]: + daemon_pids+=($!) Dec 13 14:26:44.911399 systemd-nspawn[1430]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:26:44.911554 systemd-nspawn[1430]: + /usr/bin/systemd-notify --ready Dec 13 14:26:44.912223 systemd-nspawn[1430]: + /usr/bin/google_network_daemon Dec 13 14:26:44.912810 systemd-nspawn[1430]: + /usr/bin/google_clock_skew_daemon Dec 13 14:26:44.921371 systemd-nspawn[1430]: + /usr/bin/google_accounts_daemon Dec 13 14:26:44.954158 systemd[1476]: Queued start job for default target default.target. Dec 13 14:26:44.954532 systemd[1476]: Reached target paths.target. Dec 13 14:26:44.954563 systemd[1476]: Reached target sockets.target. Dec 13 14:26:44.954589 systemd[1476]: Reached target timers.target. Dec 13 14:26:44.954610 systemd[1476]: Reached target basic.target. Dec 13 14:26:44.954683 systemd[1476]: Reached target default.target. Dec 13 14:26:44.954738 systemd[1476]: Startup finished in 152ms. Dec 13 14:26:44.954940 systemd[1]: Started user@500.service. Dec 13 14:26:44.956663 systemd[1]: Started session-1.scope. Dec 13 14:26:44.990284 systemd-nspawn[1430]: + wait -n 36 37 38 Dec 13 14:26:45.187056 systemd[1]: Started sshd@2-10.128.0.8:22-139.178.68.195:48212.service. Dec 13 14:26:45.510707 sshd[1489]: Accepted publickey for core from 139.178.68.195 port 48212 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:45.511728 sshd[1489]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:45.520259 systemd[1]: Started session-2.scope. Dec 13 14:26:45.520961 systemd-logind[1308]: New session 2 of user core. Dec 13 14:26:45.641975 google-networking[1484]: INFO Starting Google Networking daemon. Dec 13 14:26:45.731604 sshd[1489]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:45.738721 systemd[1]: sshd@2-10.128.0.8:22-139.178.68.195:48212.service: Deactivated successfully. Dec 13 14:26:45.740858 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:26:45.740910 systemd-logind[1308]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:26:45.743633 systemd-logind[1308]: Removed session 2. Dec 13 14:26:45.766444 google-clock-skew[1483]: INFO Starting Google Clock Skew daemon. Dec 13 14:26:45.776480 systemd[1]: Started sshd@3-10.128.0.8:22-139.178.68.195:48222.service. Dec 13 14:26:45.786402 google-clock-skew[1483]: INFO Clock drift token has changed: 0. Dec 13 14:26:45.795931 systemd-nspawn[1430]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:26:45.795931 systemd-nspawn[1430]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:26:45.796721 google-clock-skew[1483]: WARNING Failed to sync system time with hardware clock. Dec 13 14:26:45.810043 groupadd[1505]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:26:45.813755 groupadd[1505]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:26:45.817566 groupadd[1505]: new group: name=google-sudoers, GID=1000 Dec 13 14:26:45.830579 google-accounts[1482]: INFO Starting Google Accounts daemon. Dec 13 14:26:45.854783 google-accounts[1482]: WARNING OS Login not installed. Dec 13 14:26:45.855777 google-accounts[1482]: INFO Creating a new user account for 0. Dec 13 14:26:45.860881 systemd-nspawn[1430]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:26:45.861553 google-accounts[1482]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:26:46.073316 sshd[1503]: Accepted publickey for core from 139.178.68.195 port 48222 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:46.074597 sshd[1503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:46.081176 systemd[1]: Started session-3.scope. Dec 13 14:26:46.081493 systemd-logind[1308]: New session 3 of user core. Dec 13 14:26:46.281226 sshd[1503]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:46.285391 systemd[1]: sshd@3-10.128.0.8:22-139.178.68.195:48222.service: Deactivated successfully. Dec 13 14:26:46.286653 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:26:46.288507 systemd-logind[1308]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:26:46.290435 systemd-logind[1308]: Removed session 3. Dec 13 14:26:46.325280 systemd[1]: Started sshd@4-10.128.0.8:22-139.178.68.195:41932.service. Dec 13 14:26:46.616137 sshd[1521]: Accepted publickey for core from 139.178.68.195 port 41932 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:46.617816 sshd[1521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:46.624716 systemd[1]: Started session-4.scope. Dec 13 14:26:46.625069 systemd-logind[1308]: New session 4 of user core. Dec 13 14:26:46.831309 sshd[1521]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:46.835496 systemd[1]: sshd@4-10.128.0.8:22-139.178.68.195:41932.service: Deactivated successfully. Dec 13 14:26:46.836925 systemd-logind[1308]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:26:46.837064 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:26:46.839122 systemd-logind[1308]: Removed session 4. Dec 13 14:26:46.877051 systemd[1]: Started sshd@5-10.128.0.8:22-139.178.68.195:41944.service. Dec 13 14:26:47.171948 sshd[1528]: Accepted publickey for core from 139.178.68.195 port 41944 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:47.173929 sshd[1528]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:47.180602 systemd[1]: Started session-5.scope. Dec 13 14:26:47.180967 systemd-logind[1308]: New session 5 of user core. Dec 13 14:26:47.371366 sudo[1532]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:26:47.371799 sudo[1532]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:47.381181 dbus-daemon[1288]: \xd0}I\xfd\x89U: received setenforce notice (enforcing=-72380096) Dec 13 14:26:47.383410 sudo[1532]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:47.428732 sshd[1528]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:47.433868 systemd[1]: sshd@5-10.128.0.8:22-139.178.68.195:41944.service: Deactivated successfully. Dec 13 14:26:47.436004 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:26:47.436725 systemd-logind[1308]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:26:47.438917 systemd-logind[1308]: Removed session 5. Dec 13 14:26:47.472277 systemd[1]: Started sshd@6-10.128.0.8:22-139.178.68.195:41948.service. Dec 13 14:26:47.763592 sshd[1536]: Accepted publickey for core from 139.178.68.195 port 41948 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:47.765264 sshd[1536]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:47.771857 systemd[1]: Started session-6.scope. Dec 13 14:26:47.772218 systemd-logind[1308]: New session 6 of user core. Dec 13 14:26:47.941226 sudo[1541]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:26:47.941662 sudo[1541]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:47.946185 sudo[1541]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:47.958591 sudo[1540]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:26:47.959040 sudo[1540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:47.971737 systemd[1]: Stopping audit-rules.service... Dec 13 14:26:47.971000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:26:47.974224 auditctl[1544]: No rules Dec 13 14:26:47.974979 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:26:47.975313 systemd[1]: Stopped audit-rules.service. Dec 13 14:26:47.979248 systemd[1]: Starting audit-rules.service... Dec 13 14:26:47.979368 kernel: kauditd_printk_skb: 157 callbacks suppressed Dec 13 14:26:47.979412 kernel: audit: type=1305 audit(1734100007.971:140): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:26:47.971000 audit[1544]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2fc6c2a0 a2=420 a3=0 items=0 ppid=1 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:48.024260 kernel: audit: type=1300 audit(1734100007.971:140): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2fc6c2a0 a2=420 a3=0 items=0 ppid=1 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:48.024383 kernel: audit: type=1327 audit(1734100007.971:140): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:26:47.971000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:26:48.024657 augenrules[1562]: No rules Dec 13 14:26:48.026069 systemd[1]: Finished audit-rules.service. Dec 13 14:26:48.030648 sudo[1540]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:47.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.055389 kernel: audit: type=1131 audit(1734100007.971:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.055490 kernel: audit: type=1130 audit(1734100008.022:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.027000 audit[1540]: USER_END pid=1540 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.080252 sshd[1536]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:48.085300 systemd-logind[1308]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:26:48.087490 systemd[1]: sshd@6-10.128.0.8:22-139.178.68.195:41948.service: Deactivated successfully. Dec 13 14:26:48.088660 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:26:48.090679 systemd-logind[1308]: Removed session 6. Dec 13 14:26:48.102426 kernel: audit: type=1106 audit(1734100008.027:143): pid=1540 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.102519 kernel: audit: type=1104 audit(1734100008.027:144): pid=1540 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.027000 audit[1540]: CRED_DISP pid=1540 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.076000 audit[1536]: USER_END pid=1536 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.129574 systemd[1]: Started sshd@7-10.128.0.8:22-139.178.68.195:41956.service. Dec 13 14:26:48.157485 kernel: audit: type=1106 audit(1734100008.076:145): pid=1536 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.157624 kernel: audit: type=1104 audit(1734100008.076:146): pid=1536 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.076000 audit[1536]: CRED_DISP pid=1536 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.205831 kernel: audit: type=1131 audit(1734100008.082:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.8:22-139.178.68.195:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.8:22-139.178.68.195:41948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.8:22-139.178.68.195:41956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.439000 audit[1569]: USER_ACCT pid=1569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.441523 sshd[1569]: Accepted publickey for core from 139.178.68.195 port 41956 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:26:48.441000 audit[1569]: CRED_ACQ pid=1569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.441000 audit[1569]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b183ca0 a2=3 a3=0 items=0 ppid=1 pid=1569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:48.441000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:26:48.442799 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:48.450041 systemd[1]: Started session-7.scope. Dec 13 14:26:48.450408 systemd-logind[1308]: New session 7 of user core. Dec 13 14:26:48.459000 audit[1569]: USER_START pid=1569 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.462000 audit[1572]: CRED_ACQ pid=1572 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:48.614000 audit[1573]: USER_ACCT pid=1573 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.615811 sudo[1573]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:26:48.615000 audit[1573]: CRED_REFR pid=1573 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.616254 sudo[1573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:26:48.618000 audit[1573]: USER_START pid=1573 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.634499 systemd[1]: Starting coreos-metadata.service... Dec 13 14:26:48.683590 coreos-metadata[1577]: Dec 13 14:26:48.683 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Dec 13 14:26:48.684978 coreos-metadata[1577]: Dec 13 14:26:48.684 INFO Fetch successful Dec 13 14:26:48.685116 coreos-metadata[1577]: Dec 13 14:26:48.685 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Dec 13 14:26:48.686140 coreos-metadata[1577]: Dec 13 14:26:48.686 INFO Fetch successful Dec 13 14:26:48.686259 coreos-metadata[1577]: Dec 13 14:26:48.686 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Dec 13 14:26:48.686962 coreos-metadata[1577]: Dec 13 14:26:48.686 INFO Fetch successful Dec 13 14:26:48.687127 coreos-metadata[1577]: Dec 13 14:26:48.687 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Dec 13 14:26:48.687948 coreos-metadata[1577]: Dec 13 14:26:48.687 INFO Fetch successful Dec 13 14:26:48.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:48.705516 systemd[1]: Finished coreos-metadata.service. Dec 13 14:26:49.576569 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:26:49.577387 systemd[1]: Stopped kubelet.service. Dec 13 14:26:49.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:49.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:49.579857 systemd[1]: Starting kubelet.service... Dec 13 14:26:49.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:26:49.729681 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:26:49.729866 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:26:49.730396 systemd[1]: Stopped kubelet.service. Dec 13 14:26:49.737079 systemd[1]: Starting kubelet.service... Dec 13 14:26:49.776202 systemd[1]: Reloading. Dec 13 14:26:49.923677 /usr/lib/systemd/system-generators/torcx-generator[1643]: time="2024-12-13T14:26:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:26:49.933033 /usr/lib/systemd/system-generators/torcx-generator[1643]: time="2024-12-13T14:26:49Z" level=info msg="torcx already run" Dec 13 14:26:50.059877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:26:50.059918 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:26:50.086129 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:26:50.206211 systemd[1]: Started kubelet.service. Dec 13 14:26:50.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:50.210010 systemd[1]: Stopping kubelet.service... Dec 13 14:26:50.211572 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:26:50.211962 systemd[1]: Stopped kubelet.service. Dec 13 14:26:50.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:50.214968 systemd[1]: Starting kubelet.service... Dec 13 14:26:50.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:50.416281 systemd[1]: Started kubelet.service. Dec 13 14:26:50.481097 kubelet[1708]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:26:50.481097 kubelet[1708]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:26:50.481097 kubelet[1708]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:26:50.482732 kubelet[1708]: I1213 14:26:50.482652 1708 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:26:51.000410 kubelet[1708]: I1213 14:26:51.000292 1708 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:26:51.000410 kubelet[1708]: I1213 14:26:51.000389 1708 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:26:51.000765 kubelet[1708]: I1213 14:26:51.000727 1708 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:26:51.054051 kubelet[1708]: I1213 14:26:51.053495 1708 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:26:51.068081 kubelet[1708]: I1213 14:26:51.068038 1708 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:26:51.068871 kubelet[1708]: I1213 14:26:51.068834 1708 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:26:51.069129 kubelet[1708]: I1213 14:26:51.069095 1708 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:26:51.069129 kubelet[1708]: I1213 14:26:51.069129 1708 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:26:51.069445 kubelet[1708]: I1213 14:26:51.069147 1708 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:26:51.069445 kubelet[1708]: I1213 14:26:51.069300 1708 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:26:51.069544 kubelet[1708]: I1213 14:26:51.069455 1708 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:26:51.069815 kubelet[1708]: I1213 14:26:51.069764 1708 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:26:51.069946 kubelet[1708]: I1213 14:26:51.069834 1708 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:26:51.069946 kubelet[1708]: I1213 14:26:51.069858 1708 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:26:51.070719 kubelet[1708]: E1213 14:26:51.070686 1708 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:51.070810 kubelet[1708]: E1213 14:26:51.070748 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:51.072204 kubelet[1708]: I1213 14:26:51.072150 1708 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:26:51.076838 kubelet[1708]: I1213 14:26:51.076805 1708 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:26:51.078286 kubelet[1708]: W1213 14:26:51.078259 1708 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:26:51.078452 kubelet[1708]: E1213 14:26:51.078427 1708 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:26:51.078726 kubelet[1708]: W1213 14:26:51.078709 1708 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.128.0.8" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:26:51.078848 kubelet[1708]: E1213 14:26:51.078833 1708 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.8" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:26:51.081248 kubelet[1708]: W1213 14:26:51.081207 1708 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:26:51.082226 kubelet[1708]: I1213 14:26:51.082198 1708 server.go:1256] "Started kubelet" Dec 13 14:26:51.083906 kubelet[1708]: I1213 14:26:51.083867 1708 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:26:51.089924 kubelet[1708]: I1213 14:26:51.089873 1708 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:26:51.090288 kubelet[1708]: I1213 14:26:51.090249 1708 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:26:51.091000 audit[1708]: AVC avc: denied { mac_admin } for pid=1708 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:51.091000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:26:51.091000 audit[1708]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb7c80 a1=c0007db980 a2=c000bb7c50 a3=25 items=0 ppid=1 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:26:51.093766 kubelet[1708]: I1213 14:26:51.093743 1708 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:26:51.091000 audit[1708]: AVC avc: denied { mac_admin } for pid=1708 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:51.091000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:26:51.091000 audit[1708]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf8900 a1=c0007db998 a2=c000bb7d10 a3=25 items=0 ppid=1 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:26:51.094327 kubelet[1708]: I1213 14:26:51.094307 1708 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:26:51.094544 kubelet[1708]: I1213 14:26:51.094526 1708 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:26:51.102074 kubelet[1708]: E1213 14:26:51.102056 1708 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:26:51.103679 kubelet[1708]: I1213 14:26:51.103626 1708 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:26:51.112912 kubelet[1708]: I1213 14:26:51.107082 1708 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:26:51.112912 kubelet[1708]: I1213 14:26:51.107615 1708 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:26:51.112912 kubelet[1708]: I1213 14:26:51.107700 1708 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:26:51.117850 kubelet[1708]: I1213 14:26:51.117814 1708 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:26:51.117997 kubelet[1708]: I1213 14:26:51.117968 1708 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:26:51.120446 kubelet[1708]: I1213 14:26:51.120404 1708 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:26:51.157825 kubelet[1708]: E1213 14:26:51.157792 1708 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.8\" not found" node="10.128.0.8" Dec 13 14:26:51.161985 kubelet[1708]: I1213 14:26:51.161950 1708 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:26:51.162172 kubelet[1708]: I1213 14:26:51.162156 1708 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:26:51.162273 kubelet[1708]: I1213 14:26:51.162262 1708 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:26:51.164711 kubelet[1708]: I1213 14:26:51.164684 1708 policy_none.go:49] "None policy: Start" Dec 13 14:26:51.165859 kubelet[1708]: I1213 14:26:51.165839 1708 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:26:51.166044 kubelet[1708]: I1213 14:26:51.166029 1708 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:26:51.166000 audit[1721]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.166000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe6e127f80 a2=0 a3=7ffe6e127f6c items=0 ppid=1708 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:26:51.170000 audit[1726]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.170000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff74ee1220 a2=0 a3=7fff74ee120c items=0 ppid=1708 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:26:51.173037 kubelet[1708]: I1213 14:26:51.173012 1708 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:26:51.172000 audit[1708]: AVC avc: denied { mac_admin } for pid=1708 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:51.172000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:26:51.172000 audit[1708]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f863f0 a1=c000f72d50 a2=c000f863c0 a3=25 items=0 ppid=1 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.172000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:26:51.173717 kubelet[1708]: I1213 14:26:51.173697 1708 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:26:51.174083 kubelet[1708]: I1213 14:26:51.174064 1708 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:26:51.180308 kubelet[1708]: E1213 14:26:51.180270 1708 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.8\" not found" Dec 13 14:26:51.177000 audit[1728]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.177000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff01a8f690 a2=0 a3=7fff01a8f67c items=0 ppid=1708 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:26:51.199000 audit[1733]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.199000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe4e213a0 a2=0 a3=7fffe4e2138c items=0 ppid=1708 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:26:51.209226 kubelet[1708]: I1213 14:26:51.209158 1708 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.8" Dec 13 14:26:51.218793 kubelet[1708]: I1213 14:26:51.218766 1708 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.8" Dec 13 14:26:51.245961 kubelet[1708]: E1213 14:26:51.245929 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.258000 audit[1738]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.258000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff24f77ea0 a2=0 a3=7fff24f77e8c items=0 ppid=1708 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:26:51.263301 kubelet[1708]: I1213 14:26:51.263259 1708 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:26:51.264000 audit[1739]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:51.264000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb4d22b30 a2=0 a3=7ffcb4d22b1c items=0 ppid=1708 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:26:51.265366 kubelet[1708]: I1213 14:26:51.265294 1708 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:26:51.265366 kubelet[1708]: I1213 14:26:51.265347 1708 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:26:51.265475 kubelet[1708]: I1213 14:26:51.265374 1708 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:26:51.265475 kubelet[1708]: E1213 14:26:51.265439 1708 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:26:51.265000 audit[1740]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.265000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3211f500 a2=0 a3=7ffe3211f4ec items=0 ppid=1708 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:26:51.268000 audit[1742]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.268000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff5e5619c0 a2=0 a3=7fff5e5619ac items=0 ppid=1708 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:26:51.268000 audit[1741]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:51.268000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2d8a5b90 a2=0 a3=7ffd2d8a5b7c items=0 ppid=1708 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.268000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:26:51.270000 audit[1744]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:51.270000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbdc446a0 a2=0 a3=7ffcbdc4468c items=0 ppid=1708 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.270000 audit[1743]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:51.270000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd6254ad00 a2=0 a3=7ffd6254acec items=0 ppid=1708 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:26:51.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:26:51.272000 audit[1745]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:51.272000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebf0ca790 a2=0 a3=7ffebf0ca77c items=0 ppid=1708 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:51.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:26:51.347122 kubelet[1708]: E1213 14:26:51.347060 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.447862 kubelet[1708]: E1213 14:26:51.447807 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.548831 kubelet[1708]: E1213 14:26:51.548670 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.649553 kubelet[1708]: E1213 14:26:51.649486 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.750267 kubelet[1708]: E1213 14:26:51.750202 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.851197 kubelet[1708]: E1213 14:26:51.851056 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.944575 sudo[1573]: pam_unix(sudo:session): session closed for user root Dec 13 14:26:51.942000 audit[1573]: USER_END pid=1573 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:51.942000 audit[1573]: CRED_DISP pid=1573 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:26:51.951916 kubelet[1708]: E1213 14:26:51.951840 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:51.986980 sshd[1569]: pam_unix(sshd:session): session closed for user core Dec 13 14:26:51.988000 audit[1569]: USER_END pid=1569 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:51.988000 audit[1569]: CRED_DISP pid=1569 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:26:51.991387 systemd[1]: sshd@7-10.128.0.8:22-139.178.68.195:41956.service: Deactivated successfully. Dec 13 14:26:51.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.8:22-139.178.68.195:41956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:51.992714 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:26:51.994222 systemd-logind[1308]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:26:51.995507 systemd-logind[1308]: Removed session 7. Dec 13 14:26:52.003123 kubelet[1708]: I1213 14:26:52.003079 1708 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:26:52.003313 kubelet[1708]: W1213 14:26:52.003282 1708 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:26:52.003409 kubelet[1708]: W1213 14:26:52.003334 1708 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:26:52.052042 kubelet[1708]: E1213 14:26:52.051981 1708 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.8\" not found" Dec 13 14:26:52.071339 kubelet[1708]: E1213 14:26:52.071268 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:52.154773 kubelet[1708]: I1213 14:26:52.153634 1708 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:26:52.155363 env[1325]: time="2024-12-13T14:26:52.155290070Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:26:52.156021 kubelet[1708]: I1213 14:26:52.155624 1708 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:26:53.071907 kubelet[1708]: I1213 14:26:53.071836 1708 apiserver.go:52] "Watching apiserver" Dec 13 14:26:53.072550 kubelet[1708]: E1213 14:26:53.071830 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:53.081844 kubelet[1708]: I1213 14:26:53.081801 1708 topology_manager.go:215] "Topology Admit Handler" podUID="4b650cc8-e30a-47eb-877a-4a6a2729d025" podNamespace="calico-system" podName="calico-node-wg9nw" Dec 13 14:26:53.082040 kubelet[1708]: I1213 14:26:53.081976 1708 topology_manager.go:215] "Topology Admit Handler" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" podNamespace="calico-system" podName="csi-node-driver-nvgkm" Dec 13 14:26:53.082117 kubelet[1708]: I1213 14:26:53.082065 1708 topology_manager.go:215] "Topology Admit Handler" podUID="3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8" podNamespace="kube-system" podName="kube-proxy-mzthr" Dec 13 14:26:53.083389 kubelet[1708]: E1213 14:26:53.083362 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:26:53.108874 kubelet[1708]: I1213 14:26:53.108834 1708 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:26:53.119963 kubelet[1708]: I1213 14:26:53.119885 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4b650cc8-e30a-47eb-877a-4a6a2729d025-tigera-ca-bundle\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120141 kubelet[1708]: I1213 14:26:53.120000 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-cni-log-dir\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120141 kubelet[1708]: I1213 14:26:53.120053 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8-lib-modules\") pod \"kube-proxy-mzthr\" (UID: \"3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8\") " pod="kube-system/kube-proxy-mzthr" Dec 13 14:26:53.120141 kubelet[1708]: I1213 14:26:53.120087 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-var-lib-calico\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120141 kubelet[1708]: I1213 14:26:53.120140 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-flexvol-driver-host\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120392 kubelet[1708]: I1213 14:26:53.120178 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e9e26c90-1c52-4599-b3cc-35a8908b64f6-kubelet-dir\") pod \"csi-node-driver-nvgkm\" (UID: \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\") " pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:26:53.120392 kubelet[1708]: I1213 14:26:53.120231 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e9e26c90-1c52-4599-b3cc-35a8908b64f6-registration-dir\") pod \"csi-node-driver-nvgkm\" (UID: \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\") " pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:26:53.120392 kubelet[1708]: I1213 14:26:53.120296 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8-kube-proxy\") pod \"kube-proxy-mzthr\" (UID: \"3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8\") " pod="kube-system/kube-proxy-mzthr" Dec 13 14:26:53.120392 kubelet[1708]: I1213 14:26:53.120341 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-lib-modules\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120392 kubelet[1708]: I1213 14:26:53.120393 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-xtables-lock\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120640 kubelet[1708]: I1213 14:26:53.120429 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-var-run-calico\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120640 kubelet[1708]: I1213 14:26:53.120481 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-cni-bin-dir\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120640 kubelet[1708]: I1213 14:26:53.120520 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hw89g\" (UniqueName: \"kubernetes.io/projected/4b650cc8-e30a-47eb-877a-4a6a2729d025-kube-api-access-hw89g\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120640 kubelet[1708]: I1213 14:26:53.120573 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8-xtables-lock\") pod \"kube-proxy-mzthr\" (UID: \"3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8\") " pod="kube-system/kube-proxy-mzthr" Dec 13 14:26:53.120640 kubelet[1708]: I1213 14:26:53.120633 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-policysync\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120881 kubelet[1708]: I1213 14:26:53.120669 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4b650cc8-e30a-47eb-877a-4a6a2729d025-node-certs\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120881 kubelet[1708]: I1213 14:26:53.120755 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4b650cc8-e30a-47eb-877a-4a6a2729d025-cni-net-dir\") pod \"calico-node-wg9nw\" (UID: \"4b650cc8-e30a-47eb-877a-4a6a2729d025\") " pod="calico-system/calico-node-wg9nw" Dec 13 14:26:53.120881 kubelet[1708]: I1213 14:26:53.120814 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e9e26c90-1c52-4599-b3cc-35a8908b64f6-varrun\") pod \"csi-node-driver-nvgkm\" (UID: \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\") " pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:26:53.120881 kubelet[1708]: I1213 14:26:53.120850 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e9e26c90-1c52-4599-b3cc-35a8908b64f6-socket-dir\") pod \"csi-node-driver-nvgkm\" (UID: \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\") " pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:26:53.121148 kubelet[1708]: I1213 14:26:53.120921 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hs4lc\" (UniqueName: \"kubernetes.io/projected/e9e26c90-1c52-4599-b3cc-35a8908b64f6-kube-api-access-hs4lc\") pod \"csi-node-driver-nvgkm\" (UID: \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\") " pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:26:53.121148 kubelet[1708]: I1213 14:26:53.120995 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8wnhh\" (UniqueName: \"kubernetes.io/projected/3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8-kube-api-access-8wnhh\") pod \"kube-proxy-mzthr\" (UID: \"3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8\") " pod="kube-system/kube-proxy-mzthr" Dec 13 14:26:53.223956 kubelet[1708]: E1213 14:26:53.223923 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.224168 kubelet[1708]: W1213 14:26:53.224144 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.224301 kubelet[1708]: E1213 14:26:53.224282 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.224799 kubelet[1708]: E1213 14:26:53.224757 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.225518 kubelet[1708]: W1213 14:26:53.225495 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.225671 kubelet[1708]: E1213 14:26:53.225654 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.226122 kubelet[1708]: E1213 14:26:53.226099 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.226268 kubelet[1708]: W1213 14:26:53.226247 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.226385 kubelet[1708]: E1213 14:26:53.226369 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.226808 kubelet[1708]: E1213 14:26:53.226788 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.226959 kubelet[1708]: W1213 14:26:53.226942 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.227064 kubelet[1708]: E1213 14:26:53.227050 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.227972 kubelet[1708]: E1213 14:26:53.227953 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.228115 kubelet[1708]: W1213 14:26:53.228095 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.228234 kubelet[1708]: E1213 14:26:53.228219 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.236608 kubelet[1708]: E1213 14:26:53.236586 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.236710 kubelet[1708]: W1213 14:26:53.236622 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.236710 kubelet[1708]: E1213 14:26:53.236645 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.260176 kubelet[1708]: E1213 14:26:53.260132 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.260176 kubelet[1708]: W1213 14:26:53.260160 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.260361 kubelet[1708]: E1213 14:26:53.260189 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.271432 kubelet[1708]: E1213 14:26:53.271397 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.271634 kubelet[1708]: W1213 14:26:53.271616 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.271795 kubelet[1708]: E1213 14:26:53.271780 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.279965 kubelet[1708]: E1213 14:26:53.276154 1708 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:26:53.279965 kubelet[1708]: W1213 14:26:53.276177 1708 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:26:53.279965 kubelet[1708]: E1213 14:26:53.276207 1708 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:26:53.388669 env[1325]: time="2024-12-13T14:26:53.388513268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mzthr,Uid:3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8,Namespace:kube-system,Attempt:0,}" Dec 13 14:26:53.391493 env[1325]: time="2024-12-13T14:26:53.391428257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wg9nw,Uid:4b650cc8-e30a-47eb-877a-4a6a2729d025,Namespace:calico-system,Attempt:0,}" Dec 13 14:26:53.933461 env[1325]: time="2024-12-13T14:26:53.933394359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.936257 env[1325]: time="2024-12-13T14:26:53.936207260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.937587 env[1325]: time="2024-12-13T14:26:53.937539783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.939189 env[1325]: time="2024-12-13T14:26:53.939148690Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.940867 env[1325]: time="2024-12-13T14:26:53.940817735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.941787 env[1325]: time="2024-12-13T14:26:53.941752383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.944222 env[1325]: time="2024-12-13T14:26:53.944166822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.945175 env[1325]: time="2024-12-13T14:26:53.945140536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:53.971882 env[1325]: time="2024-12-13T14:26:53.971631227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:53.971882 env[1325]: time="2024-12-13T14:26:53.971681074Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:53.971882 env[1325]: time="2024-12-13T14:26:53.971700221Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:53.972365 env[1325]: time="2024-12-13T14:26:53.972292790Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3 pid=1771 runtime=io.containerd.runc.v2 Dec 13 14:26:53.977981 env[1325]: time="2024-12-13T14:26:53.977682876Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:53.977981 env[1325]: time="2024-12-13T14:26:53.977744051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:53.977981 env[1325]: time="2024-12-13T14:26:53.977764592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:53.978429 env[1325]: time="2024-12-13T14:26:53.978344252Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e3b8a08ed8ccec1414cfb05030d8156c5be08172e5f259d93b1dd06fe939505 pid=1784 runtime=io.containerd.runc.v2 Dec 13 14:26:54.052088 env[1325]: time="2024-12-13T14:26:54.051223336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wg9nw,Uid:4b650cc8-e30a-47eb-877a-4a6a2729d025,Namespace:calico-system,Attempt:0,} returns sandbox id \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\"" Dec 13 14:26:54.054276 env[1325]: time="2024-12-13T14:26:54.054232215Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:26:54.064339 env[1325]: time="2024-12-13T14:26:54.063486792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mzthr,Uid:3e9f3b70-d4d4-41dc-a2e7-83c3e51490e8,Namespace:kube-system,Attempt:0,} returns sandbox id \"5e3b8a08ed8ccec1414cfb05030d8156c5be08172e5f259d93b1dd06fe939505\"" Dec 13 14:26:54.073211 kubelet[1708]: E1213 14:26:54.073145 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:54.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.8:22-47.116.17.49:59850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:54.111216 systemd[1]: Started sshd@8-10.128.0.8:22-47.116.17.49:59850.service. Dec 13 14:26:54.117008 kernel: kauditd_printk_skb: 71 callbacks suppressed Dec 13 14:26:54.117150 kernel: audit: type=1130 audit(1734100014.110:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.8:22-47.116.17.49:59850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:26:54.238786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3208956022.mount: Deactivated successfully. Dec 13 14:26:54.962081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1075979557.mount: Deactivated successfully. Dec 13 14:26:55.073413 kubelet[1708]: E1213 14:26:55.073363 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:55.120691 env[1325]: time="2024-12-13T14:26:55.120622161Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:55.123610 env[1325]: time="2024-12-13T14:26:55.123560613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:55.125815 env[1325]: time="2024-12-13T14:26:55.125752610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:55.127860 env[1325]: time="2024-12-13T14:26:55.127801677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:55.128835 env[1325]: time="2024-12-13T14:26:55.128784909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:26:55.131761 env[1325]: time="2024-12-13T14:26:55.130552434Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:26:55.132025 env[1325]: time="2024-12-13T14:26:55.131650820Z" level=info msg="CreateContainer within sandbox \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:26:55.154920 env[1325]: time="2024-12-13T14:26:55.154849695Z" level=info msg="CreateContainer within sandbox \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"521079d8be20e418ddbb9eafffd765cb82e42e9f44654e2e12544bdf0eff1769\"" Dec 13 14:26:55.156088 env[1325]: time="2024-12-13T14:26:55.156047636Z" level=info msg="StartContainer for \"521079d8be20e418ddbb9eafffd765cb82e42e9f44654e2e12544bdf0eff1769\"" Dec 13 14:26:55.256617 env[1325]: time="2024-12-13T14:26:55.255721746Z" level=info msg="StartContainer for \"521079d8be20e418ddbb9eafffd765cb82e42e9f44654e2e12544bdf0eff1769\" returns successfully" Dec 13 14:26:55.268127 kubelet[1708]: E1213 14:26:55.266577 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:26:55.306702 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-521079d8be20e418ddbb9eafffd765cb82e42e9f44654e2e12544bdf0eff1769-rootfs.mount: Deactivated successfully. Dec 13 14:26:55.357203 env[1325]: time="2024-12-13T14:26:55.357137983Z" level=info msg="shim disconnected" id=521079d8be20e418ddbb9eafffd765cb82e42e9f44654e2e12544bdf0eff1769 Dec 13 14:26:55.357203 env[1325]: time="2024-12-13T14:26:55.357201841Z" level=warning msg="cleaning up after shim disconnected" id=521079d8be20e418ddbb9eafffd765cb82e42e9f44654e2e12544bdf0eff1769 namespace=k8s.io Dec 13 14:26:55.357548 env[1325]: time="2024-12-13T14:26:55.357220417Z" level=info msg="cleaning up dead shim" Dec 13 14:26:55.368970 env[1325]: time="2024-12-13T14:26:55.368887991Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:26:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1900 runtime=io.containerd.runc.v2\n" Dec 13 14:26:56.074049 kubelet[1708]: E1213 14:26:56.074000 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:56.296414 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2412679403.mount: Deactivated successfully. Dec 13 14:26:56.966904 env[1325]: time="2024-12-13T14:26:56.966823446Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:56.969598 env[1325]: time="2024-12-13T14:26:56.969547325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:56.971702 env[1325]: time="2024-12-13T14:26:56.971656972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:56.973812 env[1325]: time="2024-12-13T14:26:56.973749251Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:56.974612 env[1325]: time="2024-12-13T14:26:56.974571677Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:26:56.976269 env[1325]: time="2024-12-13T14:26:56.976236487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:26:56.977313 env[1325]: time="2024-12-13T14:26:56.977266089Z" level=info msg="CreateContainer within sandbox \"5e3b8a08ed8ccec1414cfb05030d8156c5be08172e5f259d93b1dd06fe939505\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:26:56.996118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3157255228.mount: Deactivated successfully. Dec 13 14:26:57.006479 env[1325]: time="2024-12-13T14:26:57.006424587Z" level=info msg="CreateContainer within sandbox \"5e3b8a08ed8ccec1414cfb05030d8156c5be08172e5f259d93b1dd06fe939505\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"44eadd1b6e8d4a8a47b6949cf0946d8a1bb2ca32cbd9a49477c1e760bbad7c79\"" Dec 13 14:26:57.007343 env[1325]: time="2024-12-13T14:26:57.007303562Z" level=info msg="StartContainer for \"44eadd1b6e8d4a8a47b6949cf0946d8a1bb2ca32cbd9a49477c1e760bbad7c79\"" Dec 13 14:26:57.074440 kubelet[1708]: E1213 14:26:57.074386 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:57.092098 env[1325]: time="2024-12-13T14:26:57.092044303Z" level=info msg="StartContainer for \"44eadd1b6e8d4a8a47b6949cf0946d8a1bb2ca32cbd9a49477c1e760bbad7c79\" returns successfully" Dec 13 14:26:57.161000 audit[1974]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.177932 kernel: audit: type=1325 audit(1734100017.161:185): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.164000 audit[1973]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.204420 kernel: audit: type=1325 audit(1734100017.164:186): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.204610 kernel: audit: type=1300 audit(1734100017.164:186): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd16a47500 a2=0 a3=7ffd16a474ec items=0 ppid=1933 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.164000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd16a47500 a2=0 a3=7ffd16a474ec items=0 ppid=1933 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.164000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:26:57.227653 kernel: audit: type=1327 audit(1734100017.164:186): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:26:57.166000 audit[1976]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.257836 kernel: audit: type=1325 audit(1734100017.166:187): table=nat:16 family=10 entries=1 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.257990 kernel: audit: type=1300 audit(1734100017.166:187): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd16b1c250 a2=0 a3=7ffd16b1c23c items=0 ppid=1933 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.166000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd16b1c250 a2=0 a3=7ffd16b1c23c items=0 ppid=1933 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.268918 kubelet[1708]: E1213 14:26:57.267299 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:26:57.298970 kernel: audit: type=1327 audit(1734100017.166:187): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:26:57.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:26:57.168000 audit[1977]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.314151 kubelet[1708]: I1213 14:26:57.314084 1708 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mzthr" podStartSLOduration=3.40389625 podStartE2EDuration="6.314002478s" podCreationTimestamp="2024-12-13 14:26:51 +0000 UTC" firstStartedPulling="2024-12-13 14:26:54.064956241 +0000 UTC m=+3.637836728" lastFinishedPulling="2024-12-13 14:26:56.975062461 +0000 UTC m=+6.547942956" observedRunningTime="2024-12-13 14:26:57.313519581 +0000 UTC m=+6.886400084" watchObservedRunningTime="2024-12-13 14:26:57.314002478 +0000 UTC m=+6.886882981" Dec 13 14:26:57.325956 kernel: audit: type=1325 audit(1734100017.168:188): table=filter:17 family=10 entries=1 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.328205 kernel: audit: type=1300 audit(1734100017.168:188): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc1e3b6c0 a2=0 a3=7ffcc1e3b6ac items=0 ppid=1933 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.168000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc1e3b6c0 a2=0 a3=7ffcc1e3b6ac items=0 ppid=1933 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:26:57.161000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce2ce7c00 a2=0 a3=7ffce2ce7bec items=0 ppid=1933 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:26:57.180000 audit[1978]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.180000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe53593fa0 a2=0 a3=7ffe53593f8c items=0 ppid=1933 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:26:57.183000 audit[1979]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.183000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbb3447d0 a2=0 a3=7fffbb3447bc items=0 ppid=1933 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:26:57.290000 audit[1980]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.290000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff268b1ec0 a2=0 a3=7fff268b1eac items=0 ppid=1933 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:26:57.311000 audit[1982]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.311000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc0d5b0ca0 a2=0 a3=7ffc0d5b0c8c items=0 ppid=1933 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:26:57.336000 audit[1985]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.336000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc88fde970 a2=0 a3=7ffc88fde95c items=0 ppid=1933 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:26:57.339000 audit[1986]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.339000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec9b96b30 a2=0 a3=7ffec9b96b1c items=0 ppid=1933 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:26:57.344000 audit[1988]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.344000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcaae444b0 a2=0 a3=7ffcaae4449c items=0 ppid=1933 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:26:57.347000 audit[1989]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.347000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff3970660 a2=0 a3=7ffff397064c items=0 ppid=1933 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:26:57.352000 audit[1991]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.352000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4b0a02a0 a2=0 a3=7ffd4b0a028c items=0 ppid=1933 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:26:57.361000 audit[1994]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.361000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdf3d4c8d0 a2=0 a3=7ffdf3d4c8bc items=0 ppid=1933 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:26:57.364000 audit[1995]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.364000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc63ef8c10 a2=0 a3=7ffc63ef8bfc items=0 ppid=1933 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:26:57.368000 audit[1997]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.368000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef7423e60 a2=0 a3=7ffef7423e4c items=0 ppid=1933 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:26:57.370000 audit[1998]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.370000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff39a79f40 a2=0 a3=7fff39a79f2c items=0 ppid=1933 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:26:57.373000 audit[2000]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.373000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd32064400 a2=0 a3=7ffd320643ec items=0 ppid=1933 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:26:57.379000 audit[2003]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.379000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff94aca7c0 a2=0 a3=7fff94aca7ac items=0 ppid=1933 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:26:57.384000 audit[2006]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.384000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0d0f1710 a2=0 a3=7ffe0d0f16fc items=0 ppid=1933 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:26:57.385000 audit[2007]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.385000 audit[2007]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1defa1e0 a2=0 a3=7ffe1defa1cc items=0 ppid=1933 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:26:57.389000 audit[2009]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.389000 audit[2009]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff8487a070 a2=0 a3=7fff8487a05c items=0 ppid=1933 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:26:57.420000 audit[2014]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2014 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.420000 audit[2014]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcc34b3920 a2=0 a3=7ffcc34b390c items=0 ppid=1933 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:26:57.422000 audit[2015]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2015 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.422000 audit[2015]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec050ebe0 a2=0 a3=7ffec050ebcc items=0 ppid=1933 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:26:57.425000 audit[2017]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:26:57.425000 audit[2017]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff92cd9f20 a2=0 a3=7fff92cd9f0c items=0 ppid=1933 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:26:57.441000 audit[2023]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:57.441000 audit[2023]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe94e1af30 a2=0 a3=7ffe94e1af1c items=0 ppid=1933 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:57.473000 audit[2023]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=2023 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:57.473000 audit[2023]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7ffe94e1af30 a2=0 a3=7ffe94e1af1c items=0 ppid=1933 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:57.494000 audit[2031]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2031 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.494000 audit[2031]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd9fdf3870 a2=0 a3=7ffd9fdf385c items=0 ppid=1933 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:26:57.500000 audit[2033]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.500000 audit[2033]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffe8c081a0 a2=0 a3=7fffe8c0818c items=0 ppid=1933 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:26:57.505000 audit[2036]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2036 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.505000 audit[2036]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff36ad7f80 a2=0 a3=7fff36ad7f6c items=0 ppid=1933 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:26:57.507000 audit[2037]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2037 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.507000 audit[2037]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5c2f5250 a2=0 a3=7ffe5c2f523c items=0 ppid=1933 pid=2037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:26:57.511000 audit[2039]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.511000 audit[2039]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfdedc420 a2=0 a3=7ffcfdedc40c items=0 ppid=1933 pid=2039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:26:57.514000 audit[2040]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2040 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.514000 audit[2040]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee8a477a0 a2=0 a3=7ffee8a4778c items=0 ppid=1933 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:26:57.518000 audit[2042]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.518000 audit[2042]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff903e2cd0 a2=0 a3=7fff903e2cbc items=0 ppid=1933 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:26:57.523000 audit[2045]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2045 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.523000 audit[2045]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe6fde04c0 a2=0 a3=7ffe6fde04ac items=0 ppid=1933 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:26:57.525000 audit[2046]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2046 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.525000 audit[2046]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3ca84c10 a2=0 a3=7ffe3ca84bfc items=0 ppid=1933 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:26:57.528000 audit[2048]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.528000 audit[2048]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe18a43500 a2=0 a3=7ffe18a434ec items=0 ppid=1933 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:26:57.530000 audit[2049]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2049 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.530000 audit[2049]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdff1da2d0 a2=0 a3=7ffdff1da2bc items=0 ppid=1933 pid=2049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:26:57.533000 audit[2051]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.533000 audit[2051]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff35b0fb0 a2=0 a3=7ffff35b0f9c items=0 ppid=1933 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:26:57.539000 audit[2054]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.539000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9de8a6d0 a2=0 a3=7ffe9de8a6bc items=0 ppid=1933 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:26:57.545000 audit[2057]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2057 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.545000 audit[2057]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5a728680 a2=0 a3=7ffc5a72866c items=0 ppid=1933 pid=2057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:26:57.546000 audit[2058]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2058 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.546000 audit[2058]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0255b390 a2=0 a3=7ffc0255b37c items=0 ppid=1933 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:26:57.550000 audit[2060]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2060 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.550000 audit[2060]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdcdd5be00 a2=0 a3=7ffdcdd5bdec items=0 ppid=1933 pid=2060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:26:57.554000 audit[2063]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2063 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.554000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffed6daf550 a2=0 a3=7ffed6daf53c items=0 ppid=1933 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:26:57.556000 audit[2064]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2064 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.556000 audit[2064]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed817ba60 a2=0 a3=7ffed817ba4c items=0 ppid=1933 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:26:57.559000 audit[2066]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2066 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.559000 audit[2066]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffddcd519c0 a2=0 a3=7ffddcd519ac items=0 ppid=1933 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:26:57.561000 audit[2067]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.561000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf746f470 a2=0 a3=7ffdf746f45c items=0 ppid=1933 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:26:57.564000 audit[2069]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.564000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd778b80a0 a2=0 a3=7ffd778b808c items=0 ppid=1933 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:26:57.570000 audit[2072]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2072 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:26:57.570000 audit[2072]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7b4c0850 a2=0 a3=7ffd7b4c083c items=0 ppid=1933 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:26:57.578000 audit[2074]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:26:57.578000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd24be44f0 a2=0 a3=7ffd24be44dc items=0 ppid=1933 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.578000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:57.579000 audit[2074]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2074 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:26:57.579000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd24be44f0 a2=0 a3=7ffd24be44dc items=0 ppid=1933 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:57.579000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:58.075270 kubelet[1708]: E1213 14:26:58.075188 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:59.075461 kubelet[1708]: E1213 14:26:59.075348 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:26:59.267335 kubelet[1708]: E1213 14:26:59.267194 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:27:00.076138 kubelet[1708]: E1213 14:27:00.076085 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:01.076438 kubelet[1708]: E1213 14:27:01.076376 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:01.224990 env[1325]: time="2024-12-13T14:27:01.224922869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:01.227570 env[1325]: time="2024-12-13T14:27:01.227525111Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:01.229725 env[1325]: time="2024-12-13T14:27:01.229685724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:01.231729 env[1325]: time="2024-12-13T14:27:01.231684649Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:01.232578 env[1325]: time="2024-12-13T14:27:01.232533196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:27:01.235299 env[1325]: time="2024-12-13T14:27:01.235247873Z" level=info msg="CreateContainer within sandbox \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:27:01.257915 env[1325]: time="2024-12-13T14:27:01.257847204Z" level=info msg="CreateContainer within sandbox \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e360be336ba09e8132cdb6337d1bedde2aedbe25a935b4916fb51e8957479772\"" Dec 13 14:27:01.258754 env[1325]: time="2024-12-13T14:27:01.258711007Z" level=info msg="StartContainer for \"e360be336ba09e8132cdb6337d1bedde2aedbe25a935b4916fb51e8957479772\"" Dec 13 14:27:01.266739 kubelet[1708]: E1213 14:27:01.266193 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:27:01.362486 env[1325]: time="2024-12-13T14:27:01.361079129Z" level=info msg="StartContainer for \"e360be336ba09e8132cdb6337d1bedde2aedbe25a935b4916fb51e8957479772\" returns successfully" Dec 13 14:27:02.051920 kernel: kauditd_printk_skb: 144 callbacks suppressed Dec 13 14:27:02.052130 kernel: audit: type=1325 audit(1734100022.029:236): table=filter:65 family=2 entries=8 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:02.029000 audit[2108]: NETFILTER_CFG table=filter:65 family=2 entries=8 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:02.029000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd88a4a260 a2=0 a3=7ffd88a4a24c items=0 ppid=1933 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.087474 kubelet[1708]: E1213 14:27:02.087432 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:02.088068 kernel: audit: type=1300 audit(1734100022.029:236): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd88a4a260 a2=0 a3=7ffd88a4a24c items=0 ppid=1933 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:02.120199 kernel: audit: type=1327 audit(1734100022.029:236): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:02.120359 kernel: audit: type=1325 audit(1734100022.090:237): table=nat:66 family=2 entries=34 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:02.090000 audit[2108]: NETFILTER_CFG table=nat:66 family=2 entries=34 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:02.090000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd88a4a260 a2=0 a3=7ffd88a4a24c items=0 ppid=1933 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.155974 kernel: audit: type=1300 audit(1734100022.090:237): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd88a4a260 a2=0 a3=7ffd88a4a24c items=0 ppid=1933 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:02.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:02.172948 kernel: audit: type=1327 audit(1734100022.090:237): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:02.312291 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e360be336ba09e8132cdb6337d1bedde2aedbe25a935b4916fb51e8957479772-rootfs.mount: Deactivated successfully. Dec 13 14:27:02.361456 kubelet[1708]: I1213 14:27:02.361423 1708 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:27:03.089403 kubelet[1708]: E1213 14:27:03.089342 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:03.271695 env[1325]: time="2024-12-13T14:27:03.271637715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvgkm,Uid:e9e26c90-1c52-4599-b3cc-35a8908b64f6,Namespace:calico-system,Attempt:0,}" Dec 13 14:27:03.433700 env[1325]: time="2024-12-13T14:27:03.433203379Z" level=info msg="shim disconnected" id=e360be336ba09e8132cdb6337d1bedde2aedbe25a935b4916fb51e8957479772 Dec 13 14:27:03.433700 env[1325]: time="2024-12-13T14:27:03.433304281Z" level=warning msg="cleaning up after shim disconnected" id=e360be336ba09e8132cdb6337d1bedde2aedbe25a935b4916fb51e8957479772 namespace=k8s.io Dec 13 14:27:03.433700 env[1325]: time="2024-12-13T14:27:03.433320208Z" level=info msg="cleaning up dead shim" Dec 13 14:27:03.460254 env[1325]: time="2024-12-13T14:27:03.460173491Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:27:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2122 runtime=io.containerd.runc.v2\n" Dec 13 14:27:03.519138 env[1325]: time="2024-12-13T14:27:03.519047874Z" level=error msg="Failed to destroy network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:03.520360 env[1325]: time="2024-12-13T14:27:03.520295140Z" level=error msg="encountered an error cleaning up failed sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:03.520633 env[1325]: time="2024-12-13T14:27:03.520573376Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvgkm,Uid:e9e26c90-1c52-4599-b3cc-35a8908b64f6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:03.523062 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8-shm.mount: Deactivated successfully. Dec 13 14:27:03.526802 kubelet[1708]: E1213 14:27:03.526546 1708 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:03.526802 kubelet[1708]: E1213 14:27:03.526641 1708 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:27:03.526802 kubelet[1708]: E1213 14:27:03.526696 1708 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nvgkm" Dec 13 14:27:03.527384 kubelet[1708]: E1213 14:27:03.527354 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nvgkm_calico-system(e9e26c90-1c52-4599-b3cc-35a8908b64f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nvgkm_calico-system(e9e26c90-1c52-4599-b3cc-35a8908b64f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:27:04.090211 kubelet[1708]: E1213 14:27:04.090107 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:04.327477 kubelet[1708]: I1213 14:27:04.326975 1708 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:04.327652 env[1325]: time="2024-12-13T14:27:04.326977522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:27:04.328344 env[1325]: time="2024-12-13T14:27:04.328187489Z" level=info msg="StopPodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\"" Dec 13 14:27:04.364472 env[1325]: time="2024-12-13T14:27:04.363918876Z" level=error msg="StopPodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" failed" error="failed to destroy network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:04.364658 kubelet[1708]: E1213 14:27:04.364278 1708 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:04.364658 kubelet[1708]: E1213 14:27:04.364395 1708 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8"} Dec 13 14:27:04.364658 kubelet[1708]: E1213 14:27:04.364471 1708 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:27:04.364658 kubelet[1708]: E1213 14:27:04.364544 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e9e26c90-1c52-4599-b3cc-35a8908b64f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nvgkm" podUID="e9e26c90-1c52-4599-b3cc-35a8908b64f6" Dec 13 14:27:04.874507 kubelet[1708]: I1213 14:27:04.874464 1708 topology_manager.go:215] "Topology Admit Handler" podUID="93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81" podNamespace="default" podName="nginx-deployment-6d5f899847-kzw56" Dec 13 14:27:05.035350 kubelet[1708]: I1213 14:27:05.035298 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmkgw\" (UniqueName: \"kubernetes.io/projected/93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81-kube-api-access-xmkgw\") pod \"nginx-deployment-6d5f899847-kzw56\" (UID: \"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81\") " pod="default/nginx-deployment-6d5f899847-kzw56" Dec 13 14:27:05.090765 kubelet[1708]: E1213 14:27:05.090691 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:05.179162 env[1325]: time="2024-12-13T14:27:05.178784670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-kzw56,Uid:93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81,Namespace:default,Attempt:0,}" Dec 13 14:27:05.373281 env[1325]: time="2024-12-13T14:27:05.373205904Z" level=error msg="Failed to destroy network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:05.374444 env[1325]: time="2024-12-13T14:27:05.374384317Z" level=error msg="encountered an error cleaning up failed sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:05.374653 env[1325]: time="2024-12-13T14:27:05.374612297Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-kzw56,Uid:93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:05.375800 kubelet[1708]: E1213 14:27:05.375186 1708 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:05.375800 kubelet[1708]: E1213 14:27:05.375282 1708 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-kzw56" Dec 13 14:27:05.375800 kubelet[1708]: E1213 14:27:05.375353 1708 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-kzw56" Dec 13 14:27:05.376122 kubelet[1708]: E1213 14:27:05.375757 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-kzw56_default(93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-kzw56_default(93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-kzw56" podUID="93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81" Dec 13 14:27:05.377496 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd-shm.mount: Deactivated successfully. Dec 13 14:27:06.015006 sshd[1845]: kex_exchange_identification: banner line contains invalid characters Dec 13 14:27:06.015006 sshd[1845]: banner exchange: Connection from 47.116.17.49 port 59850: invalid format Dec 13 14:27:06.016110 systemd[1]: sshd@8-10.128.0.8:22-47.116.17.49:59850.service: Deactivated successfully. Dec 13 14:27:06.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.8:22-47.116.17.49:59850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:06.041951 kernel: audit: type=1131 audit(1734100026.015:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.8:22-47.116.17.49:59850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:06.091719 kubelet[1708]: E1213 14:27:06.091667 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:06.331886 kubelet[1708]: I1213 14:27:06.331752 1708 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:06.333047 env[1325]: time="2024-12-13T14:27:06.332932923Z" level=info msg="StopPodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\"" Dec 13 14:27:06.367831 env[1325]: time="2024-12-13T14:27:06.367734588Z" level=error msg="StopPodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" failed" error="failed to destroy network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:27:06.368172 kubelet[1708]: E1213 14:27:06.368138 1708 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:06.368329 kubelet[1708]: E1213 14:27:06.368206 1708 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd"} Dec 13 14:27:06.368329 kubelet[1708]: E1213 14:27:06.368270 1708 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:27:06.368329 kubelet[1708]: E1213 14:27:06.368320 1708 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-kzw56" podUID="93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81" Dec 13 14:27:06.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:06.690015 kernel: audit: type=1131 audit(1734100026.664:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:06.665078 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:27:07.093138 kubelet[1708]: E1213 14:27:07.092583 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:08.093760 kubelet[1708]: E1213 14:27:08.093674 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:09.094374 kubelet[1708]: E1213 14:27:09.094303 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:10.094936 kubelet[1708]: E1213 14:27:10.094842 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:10.765280 systemd[1]: Started sshd@9-10.128.0.8:22-61.153.208.38:40764.service. Dec 13 14:27:10.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.8:22-61.153.208.38:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:10.789966 kernel: audit: type=1130 audit(1734100030.764:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.8:22-61.153.208.38:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:11.070769 kubelet[1708]: E1213 14:27:11.070278 1708 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:11.095986 kubelet[1708]: E1213 14:27:11.095876 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:11.103683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount769410967.mount: Deactivated successfully. Dec 13 14:27:11.147956 env[1325]: time="2024-12-13T14:27:11.147870300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:11.150640 env[1325]: time="2024-12-13T14:27:11.150581995Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:11.152785 env[1325]: time="2024-12-13T14:27:11.152738274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:11.154951 env[1325]: time="2024-12-13T14:27:11.154912658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:11.155621 env[1325]: time="2024-12-13T14:27:11.155576112Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:27:11.183024 env[1325]: time="2024-12-13T14:27:11.182950147Z" level=info msg="CreateContainer within sandbox \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:27:11.207235 env[1325]: time="2024-12-13T14:27:11.207177747Z" level=info msg="CreateContainer within sandbox \"5022f45f233e556e4ea3ab0c9d232a167660bc9b5d7014ded5e68a53f24232d3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"90d374ae0fe09b3a812e093fb1e9ec4391fde688d2401e3a539ee08e7d14512f\"" Dec 13 14:27:11.208203 env[1325]: time="2024-12-13T14:27:11.208134165Z" level=info msg="StartContainer for \"90d374ae0fe09b3a812e093fb1e9ec4391fde688d2401e3a539ee08e7d14512f\"" Dec 13 14:27:11.301950 env[1325]: time="2024-12-13T14:27:11.300115413Z" level=info msg="StartContainer for \"90d374ae0fe09b3a812e093fb1e9ec4391fde688d2401e3a539ee08e7d14512f\" returns successfully" Dec 13 14:27:11.367298 kubelet[1708]: I1213 14:27:11.367171 1708 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-wg9nw" podStartSLOduration=3.264604943 podStartE2EDuration="20.367115166s" podCreationTimestamp="2024-12-13 14:26:51 +0000 UTC" firstStartedPulling="2024-12-13 14:26:54.053482418 +0000 UTC m=+3.626362906" lastFinishedPulling="2024-12-13 14:27:11.155992637 +0000 UTC m=+20.728873129" observedRunningTime="2024-12-13 14:27:11.365704311 +0000 UTC m=+20.938584816" watchObservedRunningTime="2024-12-13 14:27:11.367115166 +0000 UTC m=+20.939995668" Dec 13 14:27:11.437839 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:27:11.438038 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:27:12.096876 kubelet[1708]: E1213 14:27:12.096811 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:12.790000 audit[2388]: AVC avc: denied { write } for pid=2388 comm="tee" name="fd" dev="proc" ino=20547 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.813925 kernel: audit: type=1400 audit(1734100032.790:241): avc: denied { write } for pid=2388 comm="tee" name="fd" dev="proc" ino=20547 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.790000 audit[2388]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd133579f5 a2=241 a3=1b6 items=1 ppid=2376 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.851023 kernel: audit: type=1300 audit(1734100032.790:241): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd133579f5 a2=241 a3=1b6 items=1 ppid=2376 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.790000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:27:12.861929 kernel: audit: type=1307 audit(1734100032.790:241): cwd="/etc/service/enabled/bird/log" Dec 13 14:27:12.862057 kernel: audit: type=1302 audit(1734100032.790:241): item=0 name="/dev/fd/63" inode=20530 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.790000 audit: PATH item=0 name="/dev/fd/63" inode=20530 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.790000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.902627 kernel: audit: type=1327 audit(1734100032.790:241): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.834000 audit[2401]: AVC avc: denied { write } for pid=2401 comm="tee" name="fd" dev="proc" ino=20579 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.834000 audit[2401]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9f7249e5 a2=241 a3=1b6 items=1 ppid=2365 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.955635 kernel: audit: type=1400 audit(1734100032.834:242): avc: denied { write } for pid=2401 comm="tee" name="fd" dev="proc" ino=20579 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.955813 kernel: audit: type=1300 audit(1734100032.834:242): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9f7249e5 a2=241 a3=1b6 items=1 ppid=2365 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.955860 kernel: audit: type=1307 audit(1734100032.834:242): cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:27:12.834000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:27:12.834000 audit: PATH item=0 name="/dev/fd/63" inode=20562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.987256 kernel: audit: type=1302 audit(1734100032.834:242): item=0 name="/dev/fd/63" inode=20562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.834000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.834000 audit[2404]: AVC avc: denied { write } for pid=2404 comm="tee" name="fd" dev="proc" ino=20583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.834000 audit[2404]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd98da9f4 a2=241 a3=1b6 items=1 ppid=2361 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.834000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:27:12.834000 audit: PATH item=0 name="/dev/fd/63" inode=20565 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.834000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.866000 audit[2409]: AVC avc: denied { write } for pid=2409 comm="tee" name="fd" dev="proc" ino=20590 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.866000 audit[2409]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc883549f4 a2=241 a3=1b6 items=1 ppid=2368 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.866000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:27:12.866000 audit: PATH item=0 name="/dev/fd/63" inode=20574 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.866000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.893000 audit[2420]: AVC avc: denied { write } for pid=2420 comm="tee" name="fd" dev="proc" ino=20602 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.893000 audit[2420]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd098c39f6 a2=241 a3=1b6 items=1 ppid=2364 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.893000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:27:12.893000 audit: PATH item=0 name="/dev/fd/63" inode=20586 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.893000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.902000 audit[2433]: AVC avc: denied { write } for pid=2433 comm="tee" name="fd" dev="proc" ino=20607 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.902000 audit[2433]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe405659e4 a2=241 a3=1b6 items=1 ppid=2371 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.902000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:27:12.902000 audit: PATH item=0 name="/dev/fd/63" inode=20599 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:12.923000 audit[2436]: AVC avc: denied { write } for pid=2436 comm="tee" name="fd" dev="proc" ino=20611 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:27:12.923000 audit[2436]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcc8db9f4 a2=241 a3=1b6 items=1 ppid=2373 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.923000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:27:12.923000 audit: PATH item=0 name="/dev/fd/63" inode=20601 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:12.923000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:27:13.097362 kubelet[1708]: E1213 14:27:13.097156 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit: BPF prog-id=10 op=LOAD Dec 13 14:27:13.197000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb8cc44b0 a2=98 a3=3 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.197000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.197000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit: BPF prog-id=11 op=LOAD Dec 13 14:27:13.197000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb8cc4290 a2=74 a3=540051 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.197000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.197000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.197000 audit: BPF prog-id=12 op=LOAD Dec 13 14:27:13.197000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb8cc42c0 a2=94 a3=2 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.197000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.197000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.319000 audit: BPF prog-id=13 op=LOAD Dec 13 14:27:13.319000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb8cc4180 a2=40 a3=1 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.319000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.320000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:27:13.320000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.320000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb8cc4250 a2=50 a3=7ffeb8cc4330 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.320000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb8cc4190 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb8cc41c0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb8cc40d0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb8cc41e0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb8cc41c0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb8cc41b0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb8cc41e0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb8cc41c0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.331000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.331000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb8cc41e0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.331000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb8cc41b0 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb8cc4220 a2=28 a3=0 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb8cc3fd0 a2=50 a3=1 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit: BPF prog-id=14 op=LOAD Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb8cc3fd0 a2=94 a3=5 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb8cc4080 a2=50 a3=1 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb8cc41a0 a2=4 a3=38 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.332000 audit[2470]: AVC avc: denied { confidentiality } for pid=2470 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:13.332000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb8cc41f0 a2=94 a3=6 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.332000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { confidentiality } for pid=2470 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:13.333000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb8cc39a0 a2=94 a3=83 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.333000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.333000 audit[2470]: AVC avc: denied { confidentiality } for pid=2470 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:13.333000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb8cc39a0 a2=94 a3=83 items=0 ppid=2362 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.333000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit: BPF prog-id=15 op=LOAD Dec 13 14:27:13.346000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc47bb54c0 a2=98 a3=1999999999999999 items=0 ppid=2362 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.346000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:27:13.346000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.346000 audit: BPF prog-id=16 op=LOAD Dec 13 14:27:13.346000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc47bb53a0 a2=74 a3=ffff items=0 ppid=2362 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.346000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:27:13.347000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.347000 audit: BPF prog-id=17 op=LOAD Dec 13 14:27:13.347000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc47bb53e0 a2=40 a3=7ffc47bb55c0 items=0 ppid=2362 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.347000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:27:13.347000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:27:13.423963 systemd-networkd[1077]: vxlan.calico: Link UP Dec 13 14:27:13.423974 systemd-networkd[1077]: vxlan.calico: Gained carrier Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.459000 audit: BPF prog-id=18 op=LOAD Dec 13 14:27:13.459000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb891ddd0 a2=98 a3=ffffffff items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.459000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.459000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit: BPF prog-id=19 op=LOAD Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb891dbe0 a2=74 a3=540051 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit: BPF prog-id=20 op=LOAD Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb891dc10 a2=94 a3=2 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeb891dae0 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb891db10 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb891da20 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeb891db30 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeb891db10 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeb891db00 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeb891db30 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb891db10 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb891db30 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb891db00 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffeb891db70 a2=28 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.460000 audit: BPF prog-id=21 op=LOAD Dec 13 14:27:13.460000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb891d9e0 a2=40 a3=0 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.460000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.460000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffeb891d9d0 a2=50 a3=2800 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffeb891d9d0 a2=50 a3=2800 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit: BPF prog-id=22 op=LOAD Dec 13 14:27:13.461000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb891d1f0 a2=94 a3=2 items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.461000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { bpf } for pid=2500 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: AVC avc: denied { perfmon } for pid=2500 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.461000 audit[2500]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb891d2f0 a2=94 a3=2d items=0 ppid=2362 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit: BPF prog-id=24 op=LOAD Dec 13 14:27:13.466000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc94e1450 a2=98 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.466000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.466000 audit: BPF prog-id=25 op=LOAD Dec 13 14:27:13.466000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc94e1230 a2=74 a3=540051 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.467000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.467000 audit: BPF prog-id=26 op=LOAD Dec 13 14:27:13.467000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc94e1260 a2=94 a3=2 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.467000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.467000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.607000 audit: BPF prog-id=27 op=LOAD Dec 13 14:27:13.607000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc94e1120 a2=40 a3=1 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.608000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:27:13.608000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.608000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc94e11f0 a2=50 a3=7ffcc94e12d0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.608000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc94e1130 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc94e1160 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc94e1070 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc94e1180 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc94e1160 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc94e1150 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc94e1180 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc94e1160 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc94e1180 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc94e1150 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc94e11c0 a2=28 a3=0 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc94e0f70 a2=50 a3=1 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit: BPF prog-id=28 op=LOAD Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc94e0f70 a2=94 a3=5 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc94e1020 a2=50 a3=1 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcc94e1140 a2=4 a3=38 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.622000 audit[2503]: AVC avc: denied { confidentiality } for pid=2503 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:13.622000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc94e1190 a2=94 a3=6 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { confidentiality } for pid=2503 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:13.623000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc94e0940 a2=94 a3=83 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.623000 audit[2503]: AVC avc: denied { confidentiality } for pid=2503 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:13.623000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc94e0940 a2=94 a3=83 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.623000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.624000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.624000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc94e2380 a2=10 a3=f1f00800 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.624000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.624000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc94e2220 a2=10 a3=3 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.624000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.624000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc94e21c0 a2=10 a3=3 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.624000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:13.624000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc94e21c0 a2=10 a3=7 items=0 ppid=2362 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:27:13.633000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:27:13.708000 audit[2527]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:13.708000 audit[2527]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffde8ab1e30 a2=0 a3=7ffde8ab1e1c items=0 ppid=2362 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.708000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:13.718000 audit[2528]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:13.718000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe518cd460 a2=0 a3=7ffe518cd44c items=0 ppid=2362 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.718000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:13.726000 audit[2532]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:13.726000 audit[2532]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdae2015c0 a2=0 a3=7ffdae2015ac items=0 ppid=2362 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.726000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:13.733000 audit[2526]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2526 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:13.733000 audit[2526]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffed598ab20 a2=0 a3=7ffed598ab0c items=0 ppid=2362 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.733000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:14.097650 kubelet[1708]: E1213 14:27:14.097591 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:15.017156 systemd-networkd[1077]: vxlan.calico: Gained IPv6LL Dec 13 14:27:15.097998 kubelet[1708]: E1213 14:27:15.097934 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:15.267431 env[1325]: time="2024-12-13T14:27:15.267370448Z" level=info msg="StopPodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\"" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.325 [INFO][2554] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.325 [INFO][2554] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" iface="eth0" netns="/var/run/netns/cni-b45ca71d-fc7f-67a6-f2b6-f13989e3ee99" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.325 [INFO][2554] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" iface="eth0" netns="/var/run/netns/cni-b45ca71d-fc7f-67a6-f2b6-f13989e3ee99" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.325 [INFO][2554] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" iface="eth0" netns="/var/run/netns/cni-b45ca71d-fc7f-67a6-f2b6-f13989e3ee99" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.325 [INFO][2554] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.325 [INFO][2554] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.353 [INFO][2560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.353 [INFO][2560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.353 [INFO][2560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.360 [WARNING][2560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.361 [INFO][2560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.363 [INFO][2560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:15.371677 env[1325]: 2024-12-13 14:27:15.366 [INFO][2554] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:15.371595 systemd[1]: run-netns-cni\x2db45ca71d\x2dfc7f\x2d67a6\x2df2b6\x2df13989e3ee99.mount: Deactivated successfully. Dec 13 14:27:15.373859 env[1325]: time="2024-12-13T14:27:15.373307655Z" level=info msg="TearDown network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" successfully" Dec 13 14:27:15.373859 env[1325]: time="2024-12-13T14:27:15.373365062Z" level=info msg="StopPodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" returns successfully" Dec 13 14:27:15.374607 env[1325]: time="2024-12-13T14:27:15.374571863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvgkm,Uid:e9e26c90-1c52-4599-b3cc-35a8908b64f6,Namespace:calico-system,Attempt:1,}" Dec 13 14:27:15.525755 systemd-networkd[1077]: cali668191e6a9a: Link UP Dec 13 14:27:15.540697 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:15.540858 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali668191e6a9a: link becomes ready Dec 13 14:27:15.541285 systemd-networkd[1077]: cali668191e6a9a: Gained carrier Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.440 [INFO][2567] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.8-k8s-csi--node--driver--nvgkm-eth0 csi-node-driver- calico-system e9e26c90-1c52-4599-b3cc-35a8908b64f6 1071 0 2024-12-13 14:26:51 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.8 csi-node-driver-nvgkm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali668191e6a9a [] []}} ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.440 [INFO][2567] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.478 [INFO][2578] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" HandleID="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.488 [INFO][2578] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" HandleID="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d9d20), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.8", "pod":"csi-node-driver-nvgkm", "timestamp":"2024-12-13 14:27:15.478260657 +0000 UTC"}, Hostname:"10.128.0.8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.488 [INFO][2578] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.489 [INFO][2578] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.489 [INFO][2578] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.8' Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.491 [INFO][2578] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.496 [INFO][2578] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.500 [INFO][2578] ipam/ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.503 [INFO][2578] ipam/ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.505 [INFO][2578] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.505 [INFO][2578] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.507 [INFO][2578] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13 Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.511 [INFO][2578] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.518 [INFO][2578] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.126.193/26] block=192.168.126.192/26 handle="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.518 [INFO][2578] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.193/26] handle="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" host="10.128.0.8" Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.518 [INFO][2578] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:15.565024 env[1325]: 2024-12-13 14:27:15.518 [INFO][2578] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.126.193/26] IPv6=[] ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" HandleID="k8s-pod-network.228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.566610 env[1325]: 2024-12-13 14:27:15.520 [INFO][2567] cni-plugin/k8s.go 386: Populated endpoint ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-csi--node--driver--nvgkm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e9e26c90-1c52-4599-b3cc-35a8908b64f6", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 26, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"", Pod:"csi-node-driver-nvgkm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali668191e6a9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:15.566610 env[1325]: 2024-12-13 14:27:15.520 [INFO][2567] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.126.193/32] ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.566610 env[1325]: 2024-12-13 14:27:15.520 [INFO][2567] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali668191e6a9a ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.566610 env[1325]: 2024-12-13 14:27:15.542 [INFO][2567] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.566610 env[1325]: 2024-12-13 14:27:15.542 [INFO][2567] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-csi--node--driver--nvgkm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e9e26c90-1c52-4599-b3cc-35a8908b64f6", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 26, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13", Pod:"csi-node-driver-nvgkm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali668191e6a9a", MAC:"aa:f7:2c:2f:af:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:15.566610 env[1325]: 2024-12-13 14:27:15.556 [INFO][2567] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13" Namespace="calico-system" Pod="csi-node-driver-nvgkm" WorkloadEndpoint="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:15.574000 audit[2594]: NETFILTER_CFG table=filter:71 family=2 entries=34 op=nft_register_chain pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:15.574000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc9d5f6bb0 a2=0 a3=7ffc9d5f6b9c items=0 ppid=2362 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:15.574000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:15.584364 env[1325]: time="2024-12-13T14:27:15.584260817Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:15.584633 env[1325]: time="2024-12-13T14:27:15.584316199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:15.584633 env[1325]: time="2024-12-13T14:27:15.584334896Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:15.584633 env[1325]: time="2024-12-13T14:27:15.584533471Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13 pid=2606 runtime=io.containerd.runc.v2 Dec 13 14:27:15.652550 env[1325]: time="2024-12-13T14:27:15.652500295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nvgkm,Uid:e9e26c90-1c52-4599-b3cc-35a8908b64f6,Namespace:calico-system,Attempt:1,} returns sandbox id \"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13\"" Dec 13 14:27:15.654930 env[1325]: time="2024-12-13T14:27:15.654868561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:27:16.099073 kubelet[1708]: E1213 14:27:16.099012 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:16.621597 env[1325]: time="2024-12-13T14:27:16.621520825Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.624795 env[1325]: time="2024-12-13T14:27:16.624745587Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.626760 env[1325]: time="2024-12-13T14:27:16.626703036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.628856 env[1325]: time="2024-12-13T14:27:16.628802329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:16.629772 env[1325]: time="2024-12-13T14:27:16.629711535Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:27:16.633355 env[1325]: time="2024-12-13T14:27:16.633305827Z" level=info msg="CreateContainer within sandbox \"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:27:16.656982 env[1325]: time="2024-12-13T14:27:16.655271206Z" level=info msg="CreateContainer within sandbox \"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e4d342fd8c31057b9cc17ea475036101d7f22baea06990385aa582f9a4cfbad2\"" Dec 13 14:27:16.656982 env[1325]: time="2024-12-13T14:27:16.656488936Z" level=info msg="StartContainer for \"e4d342fd8c31057b9cc17ea475036101d7f22baea06990385aa582f9a4cfbad2\"" Dec 13 14:27:16.752567 env[1325]: time="2024-12-13T14:27:16.752508079Z" level=info msg="StartContainer for \"e4d342fd8c31057b9cc17ea475036101d7f22baea06990385aa582f9a4cfbad2\" returns successfully" Dec 13 14:27:16.754504 env[1325]: time="2024-12-13T14:27:16.754464218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:27:16.937758 systemd-networkd[1077]: cali668191e6a9a: Gained IPv6LL Dec 13 14:27:17.100256 kubelet[1708]: E1213 14:27:17.100212 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:17.793436 env[1325]: time="2024-12-13T14:27:17.793351852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:17.796324 env[1325]: time="2024-12-13T14:27:17.796270647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:17.798439 env[1325]: time="2024-12-13T14:27:17.798392887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:17.800456 env[1325]: time="2024-12-13T14:27:17.800381680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:17.801190 env[1325]: time="2024-12-13T14:27:17.801136442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:27:17.803978 env[1325]: time="2024-12-13T14:27:17.803878298Z" level=info msg="CreateContainer within sandbox \"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:27:17.825514 env[1325]: time="2024-12-13T14:27:17.825419973Z" level=info msg="CreateContainer within sandbox \"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"386d26802a8af7ad86f53bd5789fb9fc01620027eab55818f43f47c9dccfc449\"" Dec 13 14:27:17.826639 env[1325]: time="2024-12-13T14:27:17.826584588Z" level=info msg="StartContainer for \"386d26802a8af7ad86f53bd5789fb9fc01620027eab55818f43f47c9dccfc449\"" Dec 13 14:27:17.879994 systemd[1]: run-containerd-runc-k8s.io-386d26802a8af7ad86f53bd5789fb9fc01620027eab55818f43f47c9dccfc449-runc.Ku5Gyg.mount: Deactivated successfully. Dec 13 14:27:17.934958 env[1325]: time="2024-12-13T14:27:17.934879833Z" level=info msg="StartContainer for \"386d26802a8af7ad86f53bd5789fb9fc01620027eab55818f43f47c9dccfc449\" returns successfully" Dec 13 14:27:18.101155 kubelet[1708]: E1213 14:27:18.100987 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:18.194322 kubelet[1708]: I1213 14:27:18.194232 1708 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:27:18.194322 kubelet[1708]: I1213 14:27:18.194305 1708 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:27:18.393102 kubelet[1708]: I1213 14:27:18.392979 1708 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-nvgkm" podStartSLOduration=25.245899216 podStartE2EDuration="27.392927128s" podCreationTimestamp="2024-12-13 14:26:51 +0000 UTC" firstStartedPulling="2024-12-13 14:27:15.6545281 +0000 UTC m=+25.227408576" lastFinishedPulling="2024-12-13 14:27:17.801556005 +0000 UTC m=+27.374436488" observedRunningTime="2024-12-13 14:27:18.392658842 +0000 UTC m=+27.965539363" watchObservedRunningTime="2024-12-13 14:27:18.392927128 +0000 UTC m=+27.965807632" Dec 13 14:27:19.102066 kubelet[1708]: E1213 14:27:19.102000 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:19.450309 kernel: kauditd_printk_skb: 517 callbacks suppressed Dec 13 14:27:19.450480 kernel: audit: type=1130 audit(1734100039.419:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.8:22-47.116.17.49:54424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.8:22-47.116.17.49:54424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.420169 systemd[1]: Started sshd@10-10.128.0.8:22-47.116.17.49:54424.service. Dec 13 14:27:20.102998 kubelet[1708]: E1213 14:27:20.102926 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:20.267132 env[1325]: time="2024-12-13T14:27:20.267042843Z" level=info msg="StopPodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\"" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.320 [INFO][2733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.320 [INFO][2733] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" iface="eth0" netns="/var/run/netns/cni-50bca3b4-8172-c263-0d89-babd63981630" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.320 [INFO][2733] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" iface="eth0" netns="/var/run/netns/cni-50bca3b4-8172-c263-0d89-babd63981630" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.321 [INFO][2733] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" iface="eth0" netns="/var/run/netns/cni-50bca3b4-8172-c263-0d89-babd63981630" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.321 [INFO][2733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.321 [INFO][2733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.348 [INFO][2739] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.349 [INFO][2739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.349 [INFO][2739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.355 [WARNING][2739] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.355 [INFO][2739] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.357 [INFO][2739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:20.360079 env[1325]: 2024-12-13 14:27:20.358 [INFO][2733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:20.365327 env[1325]: time="2024-12-13T14:27:20.361217750Z" level=info msg="TearDown network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" successfully" Dec 13 14:27:20.365327 env[1325]: time="2024-12-13T14:27:20.361279304Z" level=info msg="StopPodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" returns successfully" Dec 13 14:27:20.365918 env[1325]: time="2024-12-13T14:27:20.365833746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-kzw56,Uid:93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81,Namespace:default,Attempt:1,}" Dec 13 14:27:20.366960 systemd[1]: run-netns-cni\x2d50bca3b4\x2d8172\x2dc263\x2d0d89\x2dbabd63981630.mount: Deactivated successfully. Dec 13 14:27:20.529533 systemd-networkd[1077]: cali8a7ee913b7f: Link UP Dec 13 14:27:20.530259 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:20.538946 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8a7ee913b7f: link becomes ready Dec 13 14:27:20.540812 systemd-networkd[1077]: cali8a7ee913b7f: Gained carrier Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.434 [INFO][2745] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0 nginx-deployment-6d5f899847- default 93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81 1100 0 2024-12-13 14:27:04 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.8 nginx-deployment-6d5f899847-kzw56 eth0 default [] [] [kns.default ksa.default.default] cali8a7ee913b7f [] []}} ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.434 [INFO][2745] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.470 [INFO][2757] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" HandleID="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.484 [INFO][2757] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" HandleID="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000303a80), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.8", "pod":"nginx-deployment-6d5f899847-kzw56", "timestamp":"2024-12-13 14:27:20.470883096 +0000 UTC"}, Hostname:"10.128.0.8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.484 [INFO][2757] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.484 [INFO][2757] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.484 [INFO][2757] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.8' Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.486 [INFO][2757] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.492 [INFO][2757] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.497 [INFO][2757] ipam/ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.499 [INFO][2757] ipam/ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.502 [INFO][2757] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.502 [INFO][2757] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.505 [INFO][2757] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15 Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.509 [INFO][2757] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.518 [INFO][2757] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.126.194/26] block=192.168.126.192/26 handle="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.518 [INFO][2757] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.194/26] handle="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" host="10.128.0.8" Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.518 [INFO][2757] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:20.569618 env[1325]: 2024-12-13 14:27:20.518 [INFO][2757] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.126.194/26] IPv6=[] ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" HandleID="k8s-pod-network.c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.570785 env[1325]: 2024-12-13 14:27:20.520 [INFO][2745] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81", ResourceVersion:"1100", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"", Pod:"nginx-deployment-6d5f899847-kzw56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8a7ee913b7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:20.570785 env[1325]: 2024-12-13 14:27:20.520 [INFO][2745] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.126.194/32] ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.570785 env[1325]: 2024-12-13 14:27:20.520 [INFO][2745] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8a7ee913b7f ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.570785 env[1325]: 2024-12-13 14:27:20.541 [INFO][2745] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.570785 env[1325]: 2024-12-13 14:27:20.542 [INFO][2745] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81", ResourceVersion:"1100", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15", Pod:"nginx-deployment-6d5f899847-kzw56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8a7ee913b7f", MAC:"4a:a0:55:73:2f:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:20.570785 env[1325]: 2024-12-13 14:27:20.566 [INFO][2745] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15" Namespace="default" Pod="nginx-deployment-6d5f899847-kzw56" WorkloadEndpoint="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:20.571000 audit[2769]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:20.588980 kernel: audit: type=1325 audit(1734100040.571:345): table=filter:72 family=2 entries=38 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:20.571000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcc9134e50 a2=0 a3=7ffcc9134e3c items=0 ppid=2362 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:20.571000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:20.641696 kernel: audit: type=1300 audit(1734100040.571:345): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffcc9134e50 a2=0 a3=7ffcc9134e3c items=0 ppid=2362 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:20.641880 kernel: audit: type=1327 audit(1734100040.571:345): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:20.653714 env[1325]: time="2024-12-13T14:27:20.653607921Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:20.654007 env[1325]: time="2024-12-13T14:27:20.653675932Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:20.654007 env[1325]: time="2024-12-13T14:27:20.653735055Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:20.654583 env[1325]: time="2024-12-13T14:27:20.654216673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15 pid=2785 runtime=io.containerd.runc.v2 Dec 13 14:27:20.745869 env[1325]: time="2024-12-13T14:27:20.745814056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-kzw56,Uid:93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81,Namespace:default,Attempt:1,} returns sandbox id \"c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15\"" Dec 13 14:27:20.748624 env[1325]: time="2024-12-13T14:27:20.748540809Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:27:21.103720 kubelet[1708]: E1213 14:27:21.103653 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:21.793106 update_engine[1313]: I1213 14:27:21.792265 1313 update_attempter.cc:509] Updating boot flags... Dec 13 14:27:22.104124 kubelet[1708]: E1213 14:27:22.103994 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:22.441245 systemd-networkd[1077]: cali8a7ee913b7f: Gained IPv6LL Dec 13 14:27:23.104382 kubelet[1708]: E1213 14:27:23.104294 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:23.334095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount408196238.mount: Deactivated successfully. Dec 13 14:27:24.104486 kubelet[1708]: E1213 14:27:24.104432 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:25.052556 env[1325]: time="2024-12-13T14:27:25.052444025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:25.055225 env[1325]: time="2024-12-13T14:27:25.055178568Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:25.058005 env[1325]: time="2024-12-13T14:27:25.057969270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:25.060230 env[1325]: time="2024-12-13T14:27:25.060191785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:25.061321 env[1325]: time="2024-12-13T14:27:25.061266210Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:27:25.064095 env[1325]: time="2024-12-13T14:27:25.064049171Z" level=info msg="CreateContainer within sandbox \"c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:27:25.084264 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3156697530.mount: Deactivated successfully. Dec 13 14:27:25.093131 env[1325]: time="2024-12-13T14:27:25.093071321Z" level=info msg="CreateContainer within sandbox \"c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"77068cc7fa6eae8cf61cc3d4a30ecf35f182c578f4b42fde875be2a23797c324\"" Dec 13 14:27:25.094252 env[1325]: time="2024-12-13T14:27:25.094198522Z" level=info msg="StartContainer for \"77068cc7fa6eae8cf61cc3d4a30ecf35f182c578f4b42fde875be2a23797c324\"" Dec 13 14:27:25.105204 kubelet[1708]: E1213 14:27:25.105128 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:25.165194 env[1325]: time="2024-12-13T14:27:25.162590021Z" level=info msg="StartContainer for \"77068cc7fa6eae8cf61cc3d4a30ecf35f182c578f4b42fde875be2a23797c324\" returns successfully" Dec 13 14:27:25.409560 kubelet[1708]: I1213 14:27:25.409332 1708 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-kzw56" podStartSLOduration=17.095430104 podStartE2EDuration="21.409281335s" podCreationTimestamp="2024-12-13 14:27:04 +0000 UTC" firstStartedPulling="2024-12-13 14:27:20.747807592 +0000 UTC m=+30.320688078" lastFinishedPulling="2024-12-13 14:27:25.061658816 +0000 UTC m=+34.634539309" observedRunningTime="2024-12-13 14:27:25.409137282 +0000 UTC m=+34.982017785" watchObservedRunningTime="2024-12-13 14:27:25.409281335 +0000 UTC m=+34.982161838" Dec 13 14:27:26.105373 kubelet[1708]: E1213 14:27:26.105314 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:27.106025 kubelet[1708]: E1213 14:27:27.105937 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:28.106549 kubelet[1708]: E1213 14:27:28.106481 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:29.107658 kubelet[1708]: E1213 14:27:29.107594 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:30.108343 kubelet[1708]: E1213 14:27:30.108277 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:31.070721 kubelet[1708]: E1213 14:27:31.070657 1708 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:31.109036 kubelet[1708]: E1213 14:27:31.108978 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:31.591000 audit[2899]: NETFILTER_CFG table=filter:73 family=2 entries=20 op=nft_register_rule pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.591000 audit[2899]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7005e420 a2=0 a3=7ffe7005e40c items=0 ppid=1933 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.622702 kubelet[1708]: I1213 14:27:31.622644 1708 topology_manager.go:215] "Topology Admit Handler" podUID="aa2d6513-54eb-4ce4-80ce-d6fdee3c521f" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:27:31.640771 kubelet[1708]: I1213 14:27:31.640738 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/aa2d6513-54eb-4ce4-80ce-d6fdee3c521f-data\") pod \"nfs-server-provisioner-0\" (UID: \"aa2d6513-54eb-4ce4-80ce-d6fdee3c521f\") " pod="default/nfs-server-provisioner-0" Dec 13 14:27:31.641249 kubelet[1708]: I1213 14:27:31.641214 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2frrl\" (UniqueName: \"kubernetes.io/projected/aa2d6513-54eb-4ce4-80ce-d6fdee3c521f-kube-api-access-2frrl\") pod \"nfs-server-provisioner-0\" (UID: \"aa2d6513-54eb-4ce4-80ce-d6fdee3c521f\") " pod="default/nfs-server-provisioner-0" Dec 13 14:27:31.642293 kernel: audit: type=1325 audit(1734100051.591:346): table=filter:73 family=2 entries=20 op=nft_register_rule pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.642406 kernel: audit: type=1300 audit(1734100051.591:346): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe7005e420 a2=0 a3=7ffe7005e40c items=0 ppid=1933 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.642459 kernel: audit: type=1327 audit(1734100051.591:346): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.657000 audit[2899]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.676935 kernel: audit: type=1325 audit(1734100051.657:347): table=nat:74 family=2 entries=22 op=nft_register_rule pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.677052 kernel: audit: type=1300 audit(1734100051.657:347): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7005e420 a2=0 a3=0 items=0 ppid=1933 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.657000 audit[2899]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7005e420 a2=0 a3=0 items=0 ppid=1933 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.716581 kernel: audit: type=1327 audit(1734100051.657:347): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.716000 audit[2904]: NETFILTER_CFG table=filter:75 family=2 entries=32 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.739225 kernel: audit: type=1325 audit(1734100051.716:348): table=filter:75 family=2 entries=32 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.739356 kernel: audit: type=1300 audit(1734100051.716:348): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc769ee1f0 a2=0 a3=7ffc769ee1dc items=0 ppid=1933 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.716000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc769ee1f0 a2=0 a3=7ffc769ee1dc items=0 ppid=1933 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.787826 kernel: audit: type=1327 audit(1734100051.716:348): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.788000 audit[2904]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.788000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc769ee1f0 a2=0 a3=0 items=0 ppid=1933 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:31.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:31.805949 kernel: audit: type=1325 audit(1734100051.788:349): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:31.931591 env[1325]: time="2024-12-13T14:27:31.931543877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:aa2d6513-54eb-4ce4-80ce-d6fdee3c521f,Namespace:default,Attempt:0,}" Dec 13 14:27:32.093296 systemd-networkd[1077]: cali60e51b789ff: Link UP Dec 13 14:27:32.094224 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:32.103036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:27:32.107089 systemd-networkd[1077]: cali60e51b789ff: Gained carrier Dec 13 14:27:32.109190 kubelet[1708]: E1213 14:27:32.109154 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.000 [INFO][2906] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.8-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default aa2d6513-54eb-4ce4-80ce-d6fdee3c521f 1155 0 2024-12-13 14:27:31 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.8 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.001 [INFO][2906] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.034 [INFO][2917] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" HandleID="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Workload="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.049 [INFO][2917] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" HandleID="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Workload="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318e90), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.8", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:27:32.034711966 +0000 UTC"}, Hostname:"10.128.0.8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.049 [INFO][2917] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.050 [INFO][2917] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.050 [INFO][2917] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.8' Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.052 [INFO][2917] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.056 [INFO][2917] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.061 [INFO][2917] ipam/ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.063 [INFO][2917] ipam/ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.066 [INFO][2917] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.066 [INFO][2917] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.068 [INFO][2917] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945 Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.073 [INFO][2917] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.080 [INFO][2917] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.126.195/26] block=192.168.126.192/26 handle="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.080 [INFO][2917] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.195/26] handle="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" host="10.128.0.8" Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.080 [INFO][2917] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:32.119612 env[1325]: 2024-12-13 14:27:32.080 [INFO][2917] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.126.195/26] IPv6=[] ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" HandleID="k8s-pod-network.a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Workload="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.121083 env[1325]: 2024-12-13 14:27:32.082 [INFO][2906] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"aa2d6513-54eb-4ce4-80ce-d6fdee3c521f", ResourceVersion:"1155", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:32.121083 env[1325]: 2024-12-13 14:27:32.082 [INFO][2906] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.126.195/32] ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.121083 env[1325]: 2024-12-13 14:27:32.082 [INFO][2906] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.121083 env[1325]: 2024-12-13 14:27:32.105 [INFO][2906] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.121434 env[1325]: 2024-12-13 14:27:32.105 [INFO][2906] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"aa2d6513-54eb-4ce4-80ce-d6fdee3c521f", ResourceVersion:"1155", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"fa:f4:60:2a:ba:cf", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:32.121434 env[1325]: 2024-12-13 14:27:32.115 [INFO][2906] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.8-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:27:32.137000 audit[2938]: NETFILTER_CFG table=filter:77 family=2 entries=44 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:32.137000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7fffa0540ef0 a2=0 a3=7fffa0540edc items=0 ppid=2362 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:32.137000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:32.144644 env[1325]: time="2024-12-13T14:27:32.144560967Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:32.144804 env[1325]: time="2024-12-13T14:27:32.144660186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:32.144804 env[1325]: time="2024-12-13T14:27:32.144701102Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:32.145718 env[1325]: time="2024-12-13T14:27:32.145033489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945 pid=2946 runtime=io.containerd.runc.v2 Dec 13 14:27:32.230380 env[1325]: time="2024-12-13T14:27:32.230302549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:aa2d6513-54eb-4ce4-80ce-d6fdee3c521f,Namespace:default,Attempt:0,} returns sandbox id \"a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945\"" Dec 13 14:27:32.232460 env[1325]: time="2024-12-13T14:27:32.232406658Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:27:33.109614 kubelet[1708]: E1213 14:27:33.109556 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:33.799878 systemd[1]: run-containerd-runc-k8s.io-90d374ae0fe09b3a812e093fb1e9ec4391fde688d2401e3a539ee08e7d14512f-runc.KZp6VE.mount: Deactivated successfully. Dec 13 14:27:33.897828 systemd-networkd[1077]: cali60e51b789ff: Gained IPv6LL Dec 13 14:27:34.110106 kubelet[1708]: E1213 14:27:34.109985 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:35.006839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3837416558.mount: Deactivated successfully. Dec 13 14:27:35.111461 kubelet[1708]: E1213 14:27:35.111391 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:36.112374 kubelet[1708]: E1213 14:27:36.112323 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:37.113183 kubelet[1708]: E1213 14:27:37.113088 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:38.016521 env[1325]: time="2024-12-13T14:27:38.016449398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:38.019311 env[1325]: time="2024-12-13T14:27:38.019260323Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:38.021582 env[1325]: time="2024-12-13T14:27:38.021540534Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:38.023817 env[1325]: time="2024-12-13T14:27:38.023776159Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:38.024791 env[1325]: time="2024-12-13T14:27:38.024740411Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:27:38.027966 env[1325]: time="2024-12-13T14:27:38.027918494Z" level=info msg="CreateContainer within sandbox \"a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:27:38.046620 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount562260901.mount: Deactivated successfully. Dec 13 14:27:38.056120 env[1325]: time="2024-12-13T14:27:38.056053702Z" level=info msg="CreateContainer within sandbox \"a88c1b26ae8edd5eccac7146e7a093390a4cc52a2146e166f9a2dcd71793c945\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ba624ef292d640632f4822607eace618e78f2644a7cabbdba97b6c79110b6fd8\"" Dec 13 14:27:38.057107 env[1325]: time="2024-12-13T14:27:38.057067699Z" level=info msg="StartContainer for \"ba624ef292d640632f4822607eace618e78f2644a7cabbdba97b6c79110b6fd8\"" Dec 13 14:27:38.114052 kubelet[1708]: E1213 14:27:38.113556 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:38.140971 env[1325]: time="2024-12-13T14:27:38.139974330Z" level=info msg="StartContainer for \"ba624ef292d640632f4822607eace618e78f2644a7cabbdba97b6c79110b6fd8\" returns successfully" Dec 13 14:27:38.558000 audit[3070]: NETFILTER_CFG table=filter:78 family=2 entries=20 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:38.564453 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 14:27:38.564589 kernel: audit: type=1325 audit(1734100058.558:351): table=filter:78 family=2 entries=20 op=nft_register_rule pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:38.558000 audit[3070]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffea4a47450 a2=0 a3=7ffea4a4743c items=0 ppid=1933 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.581086 kernel: audit: type=1300 audit(1734100058.558:351): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffea4a47450 a2=0 a3=7ffea4a4743c items=0 ppid=1933 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.617769 kernel: audit: type=1327 audit(1734100058.558:351): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:38.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:38.612000 audit[3070]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:38.645261 kernel: audit: type=1325 audit(1734100058.612:352): table=nat:79 family=2 entries=106 op=nft_register_chain pid=3070 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:38.645412 kernel: audit: type=1300 audit(1734100058.612:352): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffea4a47450 a2=0 a3=7ffea4a4743c items=0 ppid=1933 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.612000 audit[3070]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffea4a47450 a2=0 a3=7ffea4a4743c items=0 ppid=1933 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:38.693760 kernel: audit: type=1327 audit(1734100058.612:352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:39.039588 systemd[1]: run-containerd-runc-k8s.io-ba624ef292d640632f4822607eace618e78f2644a7cabbdba97b6c79110b6fd8-runc.RBULEt.mount: Deactivated successfully. Dec 13 14:27:39.114865 kubelet[1708]: E1213 14:27:39.114819 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:40.115344 kubelet[1708]: E1213 14:27:40.115284 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:41.116400 kubelet[1708]: E1213 14:27:41.116336 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:42.116676 kubelet[1708]: E1213 14:27:42.116614 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:43.117233 kubelet[1708]: E1213 14:27:43.117165 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:44.117846 kubelet[1708]: E1213 14:27:44.117780 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:45.118073 kubelet[1708]: E1213 14:27:45.117985 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:46.119065 kubelet[1708]: E1213 14:27:46.118997 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:47.119422 kubelet[1708]: E1213 14:27:47.119354 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:48.119998 kubelet[1708]: E1213 14:27:48.119934 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:48.226632 kubelet[1708]: I1213 14:27:48.226588 1708 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=11.433312449 podStartE2EDuration="17.226523236s" podCreationTimestamp="2024-12-13 14:27:31 +0000 UTC" firstStartedPulling="2024-12-13 14:27:32.231929628 +0000 UTC m=+41.804810113" lastFinishedPulling="2024-12-13 14:27:38.025140404 +0000 UTC m=+47.598020900" observedRunningTime="2024-12-13 14:27:38.515914482 +0000 UTC m=+48.088794984" watchObservedRunningTime="2024-12-13 14:27:48.226523236 +0000 UTC m=+57.799403732" Dec 13 14:27:48.227201 kubelet[1708]: I1213 14:27:48.227168 1708 topology_manager.go:215] "Topology Admit Handler" podUID="ac923ad8-95c7-45a6-b519-40c317b13351" podNamespace="default" podName="test-pod-1" Dec 13 14:27:48.336687 kubelet[1708]: I1213 14:27:48.336636 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a8a7f805-2120-473a-9789-6de2922d1476\" (UniqueName: \"kubernetes.io/nfs/ac923ad8-95c7-45a6-b519-40c317b13351-pvc-a8a7f805-2120-473a-9789-6de2922d1476\") pod \"test-pod-1\" (UID: \"ac923ad8-95c7-45a6-b519-40c317b13351\") " pod="default/test-pod-1" Dec 13 14:27:48.336937 kubelet[1708]: I1213 14:27:48.336709 1708 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnmjk\" (UniqueName: \"kubernetes.io/projected/ac923ad8-95c7-45a6-b519-40c317b13351-kube-api-access-pnmjk\") pod \"test-pod-1\" (UID: \"ac923ad8-95c7-45a6-b519-40c317b13351\") " pod="default/test-pod-1" Dec 13 14:27:48.464000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.499779 kernel: Failed to create system directory netfs Dec 13 14:27:48.499958 kernel: audit: type=1400 audit(1734100068.464:353): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.500008 kernel: Failed to create system directory netfs Dec 13 14:27:48.500043 kernel: audit: type=1400 audit(1734100068.464:353): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.464000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.527873 kernel: Failed to create system directory netfs Dec 13 14:27:48.528004 kernel: audit: type=1400 audit(1734100068.464:353): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.464000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.556013 kernel: Failed to create system directory netfs Dec 13 14:27:48.556139 kernel: audit: type=1400 audit(1734100068.464:353): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.464000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.464000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bb01635e0 a1=153bc a2=557bac9ae2b0 a3=5 items=0 ppid=50 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:48.622330 kernel: audit: type=1300 audit(1734100068.464:353): arch=c000003e syscall=175 success=yes exit=0 a0=557bb01635e0 a1=153bc a2=557bac9ae2b0 a3=5 items=0 ppid=50 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:48.622486 kernel: audit: type=1327 audit(1734100068.464:353): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:48.464000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:48.623077 kernel: Failed to create system directory fscache Dec 13 14:27:48.651312 kernel: audit: type=1400 audit(1734100068.617:354): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.651467 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.679750 kernel: audit: type=1400 audit(1734100068.617:354): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.679915 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.707819 kernel: audit: type=1400 audit(1734100068.617:354): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.707938 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.736175 kernel: audit: type=1400 audit(1734100068.617:354): avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.736332 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.746478 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.751792 kernel: Failed to create system directory fscache Dec 13 14:27:48.751922 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.762295 kernel: Failed to create system directory fscache Dec 13 14:27:48.762382 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.772684 kernel: Failed to create system directory fscache Dec 13 14:27:48.772765 kernel: Failed to create system directory fscache Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.617000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.788387 kernel: Failed to create system directory fscache Dec 13 14:27:48.788538 kernel: Failed to create system directory fscache Dec 13 14:27:48.792931 kernel: FS-Cache: Loaded Dec 13 14:27:48.617000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bb03789c0 a1=4c0fc a2=557bac9ae2b0 a3=5 items=0 ppid=50 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:48.617000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.843841 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.843968 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.844003 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.854049 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.854123 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.864299 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.864382 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.874553 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.874663 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.884804 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.884923 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.895033 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.895108 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.905689 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.905786 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.915936 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.916938 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.926354 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.931548 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.931644 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.936930 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.946988 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.947082 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.957382 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.957449 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.967615 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.967703 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.978051 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.978139 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.988269 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.988359 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.998481 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.998565 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.008786 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.008862 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.013913 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.024099 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.024174 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.034305 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.039573 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.044785 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.044862 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.055099 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.055158 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.065365 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.065436 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.075635 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.075724 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.085946 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.086041 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.096471 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.096558 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.106812 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.106920 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.117035 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.117144 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.120272 kubelet[1708]: E1213 14:27:49.120197 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.127255 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.127335 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.137435 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.137536 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.147682 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.147772 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.157995 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.158085 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.168150 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.168243 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.178404 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.178497 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.188583 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.188670 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.198854 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.198958 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.209050 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.209147 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.219286 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.219376 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.229507 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.229594 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.239748 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.239847 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.249978 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.250069 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.261742 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.261849 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.270569 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.270691 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.280785 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.280867 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.291094 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.296300 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.296503 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.306629 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.306713 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.316847 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.316940 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.327054 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.327146 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.337269 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.337344 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.347576 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.347651 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.357886 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.357985 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.368110 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.368222 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.378356 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.378450 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.388599 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.388715 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.398817 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.398927 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.409024 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.409114 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.419266 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.419367 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.429531 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.429598 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.439741 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.439821 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.449956 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.450039 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.460169 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.460235 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.465284 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.475483 kernel: Failed to create system directory sunrpc Dec 13 14:27:49.475545 kernel: Failed to create system directory sunrpc Dec 13 14:27:48.821000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.500470 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:27:49.500600 kernel: RPC: Registered udp transport module. Dec 13 14:27:49.500649 kernel: RPC: Registered tcp transport module. Dec 13 14:27:49.505381 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:27:48.821000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bb03c4ad0 a1=1a7f1c a2=557bac9ae2b0 a3=5 items=6 ppid=50 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:48.821000 audit: CWD cwd="/" Dec 13 14:27:48.821000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:48.821000 audit: PATH item=1 name=(null) inode=23090 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:48.821000 audit: PATH item=2 name=(null) inode=23090 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:48.821000 audit: PATH item=3 name=(null) inode=23091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:48.821000 audit: PATH item=4 name=(null) inode=23090 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:48.821000 audit: PATH item=5 name=(null) inode=23092 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:27:48.821000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.572052 kernel: Failed to create system directory nfs Dec 13 14:27:49.572166 kernel: Failed to create system directory nfs Dec 13 14:27:49.572206 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.581765 kernel: Failed to create system directory nfs Dec 13 14:27:49.581864 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.591455 kernel: Failed to create system directory nfs Dec 13 14:27:49.591527 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.601183 kernel: Failed to create system directory nfs Dec 13 14:27:49.601269 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.606074 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.615758 kernel: Failed to create system directory nfs Dec 13 14:27:49.615869 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.625580 kernel: Failed to create system directory nfs Dec 13 14:27:49.625672 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.635448 kernel: Failed to create system directory nfs Dec 13 14:27:49.635540 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.645666 kernel: Failed to create system directory nfs Dec 13 14:27:49.645780 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.655452 kernel: Failed to create system directory nfs Dec 13 14:27:49.655543 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.665241 kernel: Failed to create system directory nfs Dec 13 14:27:49.665353 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.674949 kernel: Failed to create system directory nfs Dec 13 14:27:49.675046 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.684630 kernel: Failed to create system directory nfs Dec 13 14:27:49.684721 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.694320 kernel: Failed to create system directory nfs Dec 13 14:27:49.694430 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.704018 kernel: Failed to create system directory nfs Dec 13 14:27:49.704105 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.713716 kernel: Failed to create system directory nfs Dec 13 14:27:49.713813 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.723409 kernel: Failed to create system directory nfs Dec 13 14:27:49.723511 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.733121 kernel: Failed to create system directory nfs Dec 13 14:27:49.733210 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.742809 kernel: Failed to create system directory nfs Dec 13 14:27:49.742935 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.752674 kernel: Failed to create system directory nfs Dec 13 14:27:49.752779 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.757446 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.762366 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.772105 kernel: Failed to create system directory nfs Dec 13 14:27:49.772198 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.776942 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.781845 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.791547 kernel: Failed to create system directory nfs Dec 13 14:27:49.791638 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.801218 kernel: Failed to create system directory nfs Dec 13 14:27:49.801330 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.811093 kernel: Failed to create system directory nfs Dec 13 14:27:49.811203 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.816045 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.825728 kernel: Failed to create system directory nfs Dec 13 14:27:49.825835 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.835421 kernel: Failed to create system directory nfs Dec 13 14:27:49.835523 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.845148 kernel: Failed to create system directory nfs Dec 13 14:27:49.845271 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.850007 kernel: Failed to create system directory nfs Dec 13 14:27:49.552000 audit[3078]: AVC avc: denied { confidentiality } for pid=3078 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.883938 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:27:49.552000 audit[3078]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557bb05e5700 a1=16e97c a2=557bac9ae2b0 a3=5 items=0 ppid=50 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:49.552000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.947339 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.947429 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.947466 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.957360 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.958017 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.967403 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.967515 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.972454 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.977934 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.987234 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.987335 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.992925 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.002153 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.002974 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.007935 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.017094 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.017200 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.027150 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.027249 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.032218 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.037132 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.042135 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.047933 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.056937 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.057014 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.066959 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.067073 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.072928 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.081931 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.082020 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.091885 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.091991 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.106874 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.106960 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.106996 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.117157 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.117256 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.120609 kubelet[1708]: E1213 14:27:50.120561 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.127101 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.127183 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.132987 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.137925 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.146973 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.147978 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.157095 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.157209 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.166994 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.167122 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.176847 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.176985 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.186752 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.186887 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.196637 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.196743 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.206535 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.206607 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.216525 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.216624 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.221480 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.226427 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.231345 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.236301 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.241240 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.246181 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.251130 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.256154 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.261078 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.266047 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.270994 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.280976 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.281098 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.290801 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.290933 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.300658 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.300780 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.310528 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.310620 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.315522 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.320929 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.325986 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.335294 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.335411 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.340306 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.350253 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.350353 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.355929 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.365040 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.365136 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.374957 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.375060 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.384928 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.385016 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.394824 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.394967 kernel: Failed to create system directory nfs4 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:49.923000 audit[3083]: AVC avc: denied { confidentiality } for pid=3083 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.404714 kernel: Failed to create system directory nfs4 Dec 13 14:27:50.579112 kernel: NFS: Registering the id_resolver key type Dec 13 14:27:50.579264 kernel: Key type id_resolver registered Dec 13 14:27:50.579326 kernel: Key type id_legacy registered Dec 13 14:27:49.923000 audit[3083]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe78ddbf010 a1=208de4 a2=555edafc52b0 a3=5 items=0 ppid=50 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:49.923000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.611696 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.611814 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.611847 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.621941 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.622053 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.632347 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.632472 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.642561 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.642700 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.647828 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.658058 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.658179 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.668542 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.669043 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.679065 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.679158 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.684941 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.694520 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.694634 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.700097 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.710162 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.710264 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.715304 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.725519 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.725621 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.597000 audit[3084]: AVC avc: denied { confidentiality } for pid=3084 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:27:50.736086 kernel: Failed to create system directory rpcgss Dec 13 14:27:50.597000 audit[3084]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7dac00b010 a1=70af4 a2=56071baf22b0 a3=5 items=0 ppid=50 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:50.597000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:27:50.770130 nfsidmap[3091]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:27:50.782705 nfsidmap[3092]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:27:50.796000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:50.796000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:50.796000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:50.797000 audit[1476]: AVC avc: denied { watch_reads } for pid=1476 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:50.797000 audit[1476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5641a7289e50 a2=10 a3=ed1c003cf93cb796 items=0 ppid=1 pid=1476 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:50.797000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:27:50.797000 audit[1476]: AVC avc: denied { watch_reads } for pid=1476 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:50.797000 audit[1476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5641a7289e50 a2=10 a3=ed1c003cf93cb796 items=0 ppid=1 pid=1476 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:50.797000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:27:50.797000 audit[1476]: AVC avc: denied { watch_reads } for pid=1476 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2514 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:27:50.797000 audit[1476]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5641a7289e50 a2=10 a3=ed1c003cf93cb796 items=0 ppid=1 pid=1476 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:50.797000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:27:50.933168 env[1325]: time="2024-12-13T14:27:50.933110627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ac923ad8-95c7-45a6-b519-40c317b13351,Namespace:default,Attempt:0,}" Dec 13 14:27:51.070054 kubelet[1708]: E1213 14:27:51.069966 1708 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:51.090849 systemd-networkd[1077]: cali5ec59c6bf6e: Link UP Dec 13 14:27:51.097977 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:27:51.109491 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:27:51.110968 systemd-networkd[1077]: cali5ec59c6bf6e: Gained carrier Dec 13 14:27:51.113289 env[1325]: time="2024-12-13T14:27:51.113220438Z" level=info msg="StopPodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\"" Dec 13 14:27:51.122194 kubelet[1708]: E1213 14:27:51.122145 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.001 [INFO][3093] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.8-k8s-test--pod--1-eth0 default ac923ad8-95c7-45a6-b519-40c317b13351 1222 0 2024-12-13 14:27:32 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.8 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.002 [INFO][3093] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.039 [INFO][3105] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" HandleID="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Workload="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.052 [INFO][3105] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" HandleID="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Workload="10.128.0.8-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b70), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.8", "pod":"test-pod-1", "timestamp":"2024-12-13 14:27:51.039581088 +0000 UTC"}, Hostname:"10.128.0.8", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.052 [INFO][3105] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.052 [INFO][3105] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.052 [INFO][3105] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.8' Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.054 [INFO][3105] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.060 [INFO][3105] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.065 [INFO][3105] ipam/ipam.go 489: Trying affinity for 192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.067 [INFO][3105] ipam/ipam.go 155: Attempting to load block cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.070 [INFO][3105] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.192/26 host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.070 [INFO][3105] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.192/26 handle="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.072 [INFO][3105] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.076 [INFO][3105] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.126.192/26 handle="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.084 [INFO][3105] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.126.196/26] block=192.168.126.192/26 handle="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.084 [INFO][3105] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.196/26] handle="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" host="10.128.0.8" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.084 [INFO][3105] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.084 [INFO][3105] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.126.196/26] IPv6=[] ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" HandleID="k8s-pod-network.0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Workload="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.127789 env[1325]: 2024-12-13 14:27:51.086 [INFO][3093] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ac923ad8-95c7-45a6-b519-40c317b13351", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:51.129032 env[1325]: 2024-12-13 14:27:51.086 [INFO][3093] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.126.196/32] ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.129032 env[1325]: 2024-12-13 14:27:51.086 [INFO][3093] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.129032 env[1325]: 2024-12-13 14:27:51.111 [INFO][3093] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.129032 env[1325]: 2024-12-13 14:27:51.112 [INFO][3093] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ac923ad8-95c7-45a6-b519-40c317b13351", ResourceVersion:"1222", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"52:86:44:28:6b:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:51.129032 env[1325]: 2024-12-13 14:27:51.120 [INFO][3093] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.8-k8s-test--pod--1-eth0" Dec 13 14:27:51.141000 audit[3136]: NETFILTER_CFG table=filter:80 family=2 entries=34 op=nft_register_chain pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:27:51.141000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=18196 a0=3 a1=7ffde60b6130 a2=0 a3=7ffde60b611c items=0 ppid=2362 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:27:51.177360 env[1325]: time="2024-12-13T14:27:51.177251405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:27:51.177360 env[1325]: time="2024-12-13T14:27:51.177310706Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:27:51.177682 env[1325]: time="2024-12-13T14:27:51.177329435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:27:51.177830 env[1325]: time="2024-12-13T14:27:51.177780219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f pid=3153 runtime=io.containerd.runc.v2 Dec 13 14:27:51.282265 env[1325]: time="2024-12-13T14:27:51.282209432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ac923ad8-95c7-45a6-b519-40c317b13351,Namespace:default,Attempt:0,} returns sandbox id \"0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f\"" Dec 13 14:27:51.286995 env[1325]: time="2024-12-13T14:27:51.286954129Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.215 [WARNING][3134] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-csi--node--driver--nvgkm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e9e26c90-1c52-4599-b3cc-35a8908b64f6", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 26, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13", Pod:"csi-node-driver-nvgkm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali668191e6a9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.216 [INFO][3134] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.216 [INFO][3134] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" iface="eth0" netns="" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.216 [INFO][3134] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.216 [INFO][3134] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.281 [INFO][3181] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.282 [INFO][3181] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.282 [INFO][3181] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.290 [WARNING][3181] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.290 [INFO][3181] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.292 [INFO][3181] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:51.295595 env[1325]: 2024-12-13 14:27:51.294 [INFO][3134] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.296809 env[1325]: time="2024-12-13T14:27:51.296766128Z" level=info msg="TearDown network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" successfully" Dec 13 14:27:51.296972 env[1325]: time="2024-12-13T14:27:51.296928266Z" level=info msg="StopPodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" returns successfully" Dec 13 14:27:51.297624 env[1325]: time="2024-12-13T14:27:51.297580439Z" level=info msg="RemovePodSandbox for \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\"" Dec 13 14:27:51.297970 env[1325]: time="2024-12-13T14:27:51.297853247Z" level=info msg="Forcibly stopping sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\"" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.343 [WARNING][3209] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-csi--node--driver--nvgkm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e9e26c90-1c52-4599-b3cc-35a8908b64f6", ResourceVersion:"1093", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 26, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"228a5e9210a5a8529ad7ed1bf3e071e7868178511df9fef96c2af34d9175ef13", Pod:"csi-node-driver-nvgkm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.126.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali668191e6a9a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.343 [INFO][3209] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.343 [INFO][3209] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" iface="eth0" netns="" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.343 [INFO][3209] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.343 [INFO][3209] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.392 [INFO][3216] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.393 [INFO][3216] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.393 [INFO][3216] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.401 [WARNING][3216] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.401 [INFO][3216] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" HandleID="k8s-pod-network.bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Workload="10.128.0.8-k8s-csi--node--driver--nvgkm-eth0" Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.403 [INFO][3216] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:51.406320 env[1325]: 2024-12-13 14:27:51.404 [INFO][3209] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8" Dec 13 14:27:51.407284 env[1325]: time="2024-12-13T14:27:51.407237924Z" level=info msg="TearDown network for sandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" successfully" Dec 13 14:27:51.411457 env[1325]: time="2024-12-13T14:27:51.411409824Z" level=info msg="RemovePodSandbox \"bbe6c824eea58f7a422ee26cc8f9cf0e977356eec84d3d55eef9041b06c81ef8\" returns successfully" Dec 13 14:27:51.412288 env[1325]: time="2024-12-13T14:27:51.412229526Z" level=info msg="StopPodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\"" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.453 [WARNING][3235] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15", Pod:"nginx-deployment-6d5f899847-kzw56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8a7ee913b7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.454 [INFO][3235] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.454 [INFO][3235] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" iface="eth0" netns="" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.454 [INFO][3235] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.454 [INFO][3235] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.483 [INFO][3241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.483 [INFO][3241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.483 [INFO][3241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.492 [WARNING][3241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.492 [INFO][3241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.494 [INFO][3241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:51.496657 env[1325]: 2024-12-13 14:27:51.495 [INFO][3235] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.496657 env[1325]: time="2024-12-13T14:27:51.496627775Z" level=info msg="TearDown network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" successfully" Dec 13 14:27:51.496657 env[1325]: time="2024-12-13T14:27:51.496667649Z" level=info msg="StopPodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" returns successfully" Dec 13 14:27:51.497646 env[1325]: time="2024-12-13T14:27:51.497308339Z" level=info msg="RemovePodSandbox for \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\"" Dec 13 14:27:51.497646 env[1325]: time="2024-12-13T14:27:51.497350929Z" level=info msg="Forcibly stopping sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\"" Dec 13 14:27:51.514465 env[1325]: time="2024-12-13T14:27:51.514420291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.518595 env[1325]: time="2024-12-13T14:27:51.518552356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.522072 env[1325]: time="2024-12-13T14:27:51.522029969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.524849 env[1325]: time="2024-12-13T14:27:51.524811632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:27:51.527575 env[1325]: time="2024-12-13T14:27:51.526310261Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:27:51.530262 env[1325]: time="2024-12-13T14:27:51.530191584Z" level=info msg="CreateContainer within sandbox \"0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:27:51.545163 env[1325]: time="2024-12-13T14:27:51.543572810Z" level=info msg="CreateContainer within sandbox \"0a8ad3841727b5df002344f93ce0b76056de9abbd2c25a116a8dbe80ba6a0b9f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"7d5f9cf52537039d1d4857f7bb5140b12a750d9f035f2244a0e7151ca6164517\"" Dec 13 14:27:51.545981 env[1325]: time="2024-12-13T14:27:51.545910688Z" level=info msg="StartContainer for \"7d5f9cf52537039d1d4857f7bb5140b12a750d9f035f2244a0e7151ca6164517\"" Dec 13 14:27:51.643964 env[1325]: time="2024-12-13T14:27:51.643618450Z" level=info msg="StartContainer for \"7d5f9cf52537039d1d4857f7bb5140b12a750d9f035f2244a0e7151ca6164517\" returns successfully" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.565 [WARNING][3261] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"93ddf6c5-2c1e-4fdc-bd0b-73a5deac4a81", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 27, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.8", ContainerID:"c2e67287ace3aba3ddc474aa45acd67351887468a4edfb792c15bdf639d2bd15", Pod:"nginx-deployment-6d5f899847-kzw56", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8a7ee913b7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.565 [INFO][3261] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.565 [INFO][3261] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" iface="eth0" netns="" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.565 [INFO][3261] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.565 [INFO][3261] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.632 [INFO][3281] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.633 [INFO][3281] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.633 [INFO][3281] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.655 [WARNING][3281] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.655 [INFO][3281] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" HandleID="k8s-pod-network.de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Workload="10.128.0.8-k8s-nginx--deployment--6d5f899847--kzw56-eth0" Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.658 [INFO][3281] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:27:51.661736 env[1325]: 2024-12-13 14:27:51.660 [INFO][3261] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd" Dec 13 14:27:51.662876 env[1325]: time="2024-12-13T14:27:51.662808467Z" level=info msg="TearDown network for sandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" successfully" Dec 13 14:27:51.669451 env[1325]: time="2024-12-13T14:27:51.669392998Z" level=info msg="RemovePodSandbox \"de598df9b05e99f8a7cc3f97a39c230f01bcd41c4e47d51e35abfb635fd0c6cd\" returns successfully" Dec 13 14:27:52.123271 kubelet[1708]: E1213 14:27:52.123225 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:52.393092 systemd-networkd[1077]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:27:52.753240 sshd[2243]: kex_exchange_identification: Connection closed by remote host Dec 13 14:27:52.753240 sshd[2243]: Connection closed by 61.153.208.38 port 40764 Dec 13 14:27:52.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.8:22-61.153.208.38:40764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:52.754351 systemd[1]: sshd@9-10.128.0.8:22-61.153.208.38:40764.service: Deactivated successfully. Dec 13 14:27:53.124330 kubelet[1708]: E1213 14:27:53.124170 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:54.124931 kubelet[1708]: E1213 14:27:54.124848 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:55.125079 kubelet[1708]: E1213 14:27:55.125014 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:56.125505 kubelet[1708]: E1213 14:27:56.125437 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:57.126159 kubelet[1708]: E1213 14:27:57.126102 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:58.127102 kubelet[1708]: E1213 14:27:58.127030 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:27:59.127784 kubelet[1708]: E1213 14:27:59.127710 1708 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"