Jul 2 07:55:27.129473 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 07:55:27.129519 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:55:27.129537 kernel: BIOS-provided physical RAM map: Jul 2 07:55:27.129547 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 2 07:55:27.129555 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 2 07:55:27.129564 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 2 07:55:27.129575 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Jul 2 07:55:27.129584 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Jul 2 07:55:27.129598 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 2 07:55:27.129607 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 2 07:55:27.129617 kernel: NX (Execute Disable) protection: active Jul 2 07:55:27.129625 kernel: SMBIOS 2.8 present. Jul 2 07:55:27.129634 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Jul 2 07:55:27.129644 kernel: Hypervisor detected: KVM Jul 2 07:55:27.129656 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 2 07:55:27.129670 kernel: kvm-clock: cpu 0, msr 26192001, primary cpu clock Jul 2 07:55:27.129681 kernel: kvm-clock: using sched offset of 3741484313 cycles Jul 2 07:55:27.129693 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 2 07:55:27.129707 kernel: tsc: Detected 2494.140 MHz processor Jul 2 07:55:27.129718 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 07:55:27.129730 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 07:55:27.129742 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Jul 2 07:55:27.129760 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 07:55:27.129777 kernel: ACPI: Early table checksum verification disabled Jul 2 07:55:27.129787 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Jul 2 07:55:27.129797 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129807 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129817 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129826 kernel: ACPI: FACS 0x000000007FFE0000 000040 Jul 2 07:55:27.129836 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129847 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129871 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129885 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 07:55:27.129896 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Jul 2 07:55:27.129926 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Jul 2 07:55:27.129937 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Jul 2 07:55:27.129947 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Jul 2 07:55:27.129959 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Jul 2 07:55:27.129970 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Jul 2 07:55:27.129981 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Jul 2 07:55:27.130003 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 2 07:55:27.130014 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 2 07:55:27.130025 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 2 07:55:27.130037 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 2 07:55:27.130048 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] Jul 2 07:55:27.130059 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] Jul 2 07:55:27.130075 kernel: Zone ranges: Jul 2 07:55:27.130087 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 07:55:27.130099 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Jul 2 07:55:27.130112 kernel: Normal empty Jul 2 07:55:27.130123 kernel: Movable zone start for each node Jul 2 07:55:27.130135 kernel: Early memory node ranges Jul 2 07:55:27.130147 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 2 07:55:27.130159 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Jul 2 07:55:27.130171 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Jul 2 07:55:27.130186 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 07:55:27.130206 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 2 07:55:27.130217 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Jul 2 07:55:27.130229 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 2 07:55:27.132331 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 2 07:55:27.132353 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 2 07:55:27.132364 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 07:55:27.132376 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 2 07:55:27.132390 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 07:55:27.132415 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 2 07:55:27.132425 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 2 07:55:27.132436 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 07:55:27.132447 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 07:55:27.132459 kernel: TSC deadline timer available Jul 2 07:55:27.132482 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Jul 2 07:55:27.132493 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Jul 2 07:55:27.132505 kernel: Booting paravirtualized kernel on KVM Jul 2 07:55:27.132516 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 07:55:27.132532 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Jul 2 07:55:27.132546 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Jul 2 07:55:27.132557 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Jul 2 07:55:27.132567 kernel: pcpu-alloc: [0] 0 1 Jul 2 07:55:27.132577 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Jul 2 07:55:27.132590 kernel: kvm-guest: PV spinlocks disabled, no host support Jul 2 07:55:27.132601 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 Jul 2 07:55:27.132612 kernel: Policy zone: DMA32 Jul 2 07:55:27.132627 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:55:27.132645 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 07:55:27.132655 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 07:55:27.132666 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 2 07:55:27.132677 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 07:55:27.132689 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123076K reserved, 0K cma-reserved) Jul 2 07:55:27.132700 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Jul 2 07:55:27.132711 kernel: Kernel/User page tables isolation: enabled Jul 2 07:55:27.132722 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 07:55:27.132736 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 07:55:27.132747 kernel: rcu: Hierarchical RCU implementation. Jul 2 07:55:27.132760 kernel: rcu: RCU event tracing is enabled. Jul 2 07:55:27.132771 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Jul 2 07:55:27.132783 kernel: Rude variant of Tasks RCU enabled. Jul 2 07:55:27.132794 kernel: Tracing variant of Tasks RCU enabled. Jul 2 07:55:27.132806 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 07:55:27.132816 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Jul 2 07:55:27.132828 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Jul 2 07:55:27.132844 kernel: random: crng init done Jul 2 07:55:27.132855 kernel: Console: colour VGA+ 80x25 Jul 2 07:55:27.132865 kernel: printk: console [tty0] enabled Jul 2 07:55:27.132876 kernel: printk: console [ttyS0] enabled Jul 2 07:55:27.132888 kernel: ACPI: Core revision 20210730 Jul 2 07:55:27.132900 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 2 07:55:27.132912 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 07:55:27.132923 kernel: x2apic enabled Jul 2 07:55:27.132935 kernel: Switched APIC routing to physical x2apic. Jul 2 07:55:27.132946 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 2 07:55:27.132962 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Jul 2 07:55:27.132974 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) Jul 2 07:55:27.132995 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 2 07:55:27.133006 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 2 07:55:27.133017 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 07:55:27.133027 kernel: Spectre V2 : Mitigation: Retpolines Jul 2 07:55:27.133042 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 07:55:27.133055 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jul 2 07:55:27.133071 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Jul 2 07:55:27.133095 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 07:55:27.133107 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 07:55:27.133122 kernel: MDS: Mitigation: Clear CPU buffers Jul 2 07:55:27.133134 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 2 07:55:27.133147 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 07:55:27.133158 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 07:55:27.133170 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 07:55:27.133181 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 07:55:27.133194 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 2 07:55:27.133211 kernel: Freeing SMP alternatives memory: 32K Jul 2 07:55:27.133223 kernel: pid_max: default: 32768 minimum: 301 Jul 2 07:55:27.133253 kernel: LSM: Security Framework initializing Jul 2 07:55:27.133266 kernel: SELinux: Initializing. Jul 2 07:55:27.133277 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:55:27.133289 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 2 07:55:27.133302 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Jul 2 07:55:27.133318 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Jul 2 07:55:27.133330 kernel: signal: max sigframe size: 1776 Jul 2 07:55:27.133342 kernel: rcu: Hierarchical SRCU implementation. Jul 2 07:55:27.133355 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 2 07:55:27.133367 kernel: smp: Bringing up secondary CPUs ... Jul 2 07:55:27.133378 kernel: x86: Booting SMP configuration: Jul 2 07:55:27.133391 kernel: .... node #0, CPUs: #1 Jul 2 07:55:27.133402 kernel: kvm-clock: cpu 1, msr 26192041, secondary cpu clock Jul 2 07:55:27.133413 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Jul 2 07:55:27.133430 kernel: smp: Brought up 1 node, 2 CPUs Jul 2 07:55:27.133442 kernel: smpboot: Max logical packages: 1 Jul 2 07:55:27.133454 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) Jul 2 07:55:27.133467 kernel: devtmpfs: initialized Jul 2 07:55:27.133480 kernel: x86/mm: Memory block size: 128MB Jul 2 07:55:27.133493 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 07:55:27.133505 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Jul 2 07:55:27.133517 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 07:55:27.133528 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 07:55:27.133544 kernel: audit: initializing netlink subsys (disabled) Jul 2 07:55:27.133557 kernel: audit: type=2000 audit(1719906925.693:1): state=initialized audit_enabled=0 res=1 Jul 2 07:55:27.133569 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 07:55:27.133581 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 07:55:27.133593 kernel: cpuidle: using governor menu Jul 2 07:55:27.133604 kernel: ACPI: bus type PCI registered Jul 2 07:55:27.133617 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 07:55:27.133629 kernel: dca service started, version 1.12.1 Jul 2 07:55:27.133641 kernel: PCI: Using configuration type 1 for base access Jul 2 07:55:27.133656 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 07:55:27.133675 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 07:55:27.133688 kernel: ACPI: Added _OSI(Module Device) Jul 2 07:55:27.133700 kernel: ACPI: Added _OSI(Processor Device) Jul 2 07:55:27.133712 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 07:55:27.133725 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 07:55:27.133738 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 07:55:27.133751 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 07:55:27.133762 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 07:55:27.133779 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 07:55:27.133793 kernel: ACPI: Interpreter enabled Jul 2 07:55:27.133806 kernel: ACPI: PM: (supports S0 S5) Jul 2 07:55:27.133819 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 07:55:27.133831 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 07:55:27.133843 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jul 2 07:55:27.133856 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 07:55:27.134197 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Jul 2 07:55:27.134412 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Jul 2 07:55:27.134435 kernel: acpiphp: Slot [3] registered Jul 2 07:55:27.134448 kernel: acpiphp: Slot [4] registered Jul 2 07:55:27.134461 kernel: acpiphp: Slot [5] registered Jul 2 07:55:27.134473 kernel: acpiphp: Slot [6] registered Jul 2 07:55:27.134485 kernel: acpiphp: Slot [7] registered Jul 2 07:55:27.134498 kernel: acpiphp: Slot [8] registered Jul 2 07:55:27.134509 kernel: acpiphp: Slot [9] registered Jul 2 07:55:27.134521 kernel: acpiphp: Slot [10] registered Jul 2 07:55:27.134540 kernel: acpiphp: Slot [11] registered Jul 2 07:55:27.134551 kernel: acpiphp: Slot [12] registered Jul 2 07:55:27.134563 kernel: acpiphp: Slot [13] registered Jul 2 07:55:27.134575 kernel: acpiphp: Slot [14] registered Jul 2 07:55:27.134587 kernel: acpiphp: Slot [15] registered Jul 2 07:55:27.134598 kernel: acpiphp: Slot [16] registered Jul 2 07:55:27.134610 kernel: acpiphp: Slot [17] registered Jul 2 07:55:27.134621 kernel: acpiphp: Slot [18] registered Jul 2 07:55:27.134635 kernel: acpiphp: Slot [19] registered Jul 2 07:55:27.134653 kernel: acpiphp: Slot [20] registered Jul 2 07:55:27.134665 kernel: acpiphp: Slot [21] registered Jul 2 07:55:27.134676 kernel: acpiphp: Slot [22] registered Jul 2 07:55:27.134688 kernel: acpiphp: Slot [23] registered Jul 2 07:55:27.134699 kernel: acpiphp: Slot [24] registered Jul 2 07:55:27.134712 kernel: acpiphp: Slot [25] registered Jul 2 07:55:27.134723 kernel: acpiphp: Slot [26] registered Jul 2 07:55:27.134736 kernel: acpiphp: Slot [27] registered Jul 2 07:55:27.134748 kernel: acpiphp: Slot [28] registered Jul 2 07:55:27.134760 kernel: acpiphp: Slot [29] registered Jul 2 07:55:27.134776 kernel: acpiphp: Slot [30] registered Jul 2 07:55:27.134787 kernel: acpiphp: Slot [31] registered Jul 2 07:55:27.134799 kernel: PCI host bridge to bus 0000:00 Jul 2 07:55:27.134999 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 07:55:27.135130 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 07:55:27.135274 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 07:55:27.135394 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Jul 2 07:55:27.135519 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Jul 2 07:55:27.135661 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 07:55:27.135832 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jul 2 07:55:27.135997 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jul 2 07:55:27.136179 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jul 2 07:55:27.139504 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Jul 2 07:55:27.139710 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jul 2 07:55:27.139862 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jul 2 07:55:27.139991 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jul 2 07:55:27.140117 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jul 2 07:55:27.140335 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Jul 2 07:55:27.140471 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Jul 2 07:55:27.140631 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jul 2 07:55:27.140769 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jul 2 07:55:27.140895 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jul 2 07:55:27.141077 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jul 2 07:55:27.141218 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jul 2 07:55:27.143557 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jul 2 07:55:27.143776 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Jul 2 07:55:27.143936 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Jul 2 07:55:27.144095 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 07:55:27.145421 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:55:27.145619 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Jul 2 07:55:27.145774 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Jul 2 07:55:27.145927 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jul 2 07:55:27.146094 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 2 07:55:27.146295 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Jul 2 07:55:27.146448 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Jul 2 07:55:27.146595 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jul 2 07:55:27.146768 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Jul 2 07:55:27.146950 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Jul 2 07:55:27.147097 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Jul 2 07:55:27.149572 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jul 2 07:55:27.149826 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Jul 2 07:55:27.149976 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Jul 2 07:55:27.150115 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Jul 2 07:55:27.153374 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jul 2 07:55:27.153570 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Jul 2 07:55:27.153680 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Jul 2 07:55:27.153795 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Jul 2 07:55:27.153920 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Jul 2 07:55:27.154089 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Jul 2 07:55:27.154208 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Jul 2 07:55:27.154447 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Jul 2 07:55:27.154467 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 2 07:55:27.154476 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 2 07:55:27.154485 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 2 07:55:27.154501 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 2 07:55:27.154510 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jul 2 07:55:27.154519 kernel: iommu: Default domain type: Translated Jul 2 07:55:27.154528 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 07:55:27.154624 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jul 2 07:55:27.154759 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 07:55:27.154862 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jul 2 07:55:27.154878 kernel: vgaarb: loaded Jul 2 07:55:27.154892 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 07:55:27.154911 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 07:55:27.154924 kernel: PTP clock support registered Jul 2 07:55:27.154936 kernel: PCI: Using ACPI for IRQ routing Jul 2 07:55:27.154949 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 07:55:27.154962 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 2 07:55:27.154977 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Jul 2 07:55:27.155010 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 2 07:55:27.155024 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 2 07:55:27.155042 kernel: clocksource: Switched to clocksource kvm-clock Jul 2 07:55:27.155055 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 07:55:27.155068 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 07:55:27.155081 kernel: pnp: PnP ACPI init Jul 2 07:55:27.155094 kernel: pnp: PnP ACPI: found 4 devices Jul 2 07:55:27.155104 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 07:55:27.155114 kernel: NET: Registered PF_INET protocol family Jul 2 07:55:27.155127 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 07:55:27.155141 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 2 07:55:27.155153 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 07:55:27.155162 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 2 07:55:27.155171 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 07:55:27.155180 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 2 07:55:27.155189 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:55:27.155198 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 2 07:55:27.155206 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 07:55:27.155215 kernel: NET: Registered PF_XDP protocol family Jul 2 07:55:27.155355 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 07:55:27.155481 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 07:55:27.155604 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 07:55:27.155738 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Jul 2 07:55:27.155855 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Jul 2 07:55:27.155994 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jul 2 07:55:27.156135 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jul 2 07:55:27.156284 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Jul 2 07:55:27.156305 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jul 2 07:55:27.156446 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 35714 usecs Jul 2 07:55:27.156466 kernel: PCI: CLS 0 bytes, default 64 Jul 2 07:55:27.156476 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 2 07:55:27.156485 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Jul 2 07:55:27.156495 kernel: Initialise system trusted keyrings Jul 2 07:55:27.156506 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 2 07:55:27.156519 kernel: Key type asymmetric registered Jul 2 07:55:27.156531 kernel: Asymmetric key parser 'x509' registered Jul 2 07:55:27.156540 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 07:55:27.156556 kernel: io scheduler mq-deadline registered Jul 2 07:55:27.156568 kernel: io scheduler kyber registered Jul 2 07:55:27.156581 kernel: io scheduler bfq registered Jul 2 07:55:27.156594 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 07:55:27.156608 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jul 2 07:55:27.156620 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jul 2 07:55:27.156633 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jul 2 07:55:27.156647 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 07:55:27.156659 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 07:55:27.156677 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 2 07:55:27.156690 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 2 07:55:27.156703 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 2 07:55:27.156712 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 2 07:55:27.156893 kernel: rtc_cmos 00:03: RTC can wake from S4 Jul 2 07:55:27.157032 kernel: rtc_cmos 00:03: registered as rtc0 Jul 2 07:55:27.157141 kernel: rtc_cmos 00:03: setting system clock to 2024-07-02T07:55:26 UTC (1719906926) Jul 2 07:55:27.157301 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Jul 2 07:55:27.157321 kernel: intel_pstate: CPU model not supported Jul 2 07:55:27.157331 kernel: NET: Registered PF_INET6 protocol family Jul 2 07:55:27.157340 kernel: Segment Routing with IPv6 Jul 2 07:55:27.157350 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 07:55:27.157364 kernel: NET: Registered PF_PACKET protocol family Jul 2 07:55:27.157377 kernel: Key type dns_resolver registered Jul 2 07:55:27.157390 kernel: IPI shorthand broadcast: enabled Jul 2 07:55:27.157398 kernel: sched_clock: Marking stable (732600929, 102495686)->(992803256, -157706641) Jul 2 07:55:27.157407 kernel: registered taskstats version 1 Jul 2 07:55:27.157421 kernel: Loading compiled-in X.509 certificates Jul 2 07:55:27.157430 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 07:55:27.157439 kernel: Key type .fscrypt registered Jul 2 07:55:27.157447 kernel: Key type fscrypt-provisioning registered Jul 2 07:55:27.157456 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 07:55:27.157465 kernel: ima: Allocated hash algorithm: sha1 Jul 2 07:55:27.157474 kernel: ima: No architecture policies found Jul 2 07:55:27.157484 kernel: clk: Disabling unused clocks Jul 2 07:55:27.157500 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 07:55:27.157514 kernel: Write protecting the kernel read-only data: 28672k Jul 2 07:55:27.157528 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 07:55:27.157541 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 07:55:27.157550 kernel: Run /init as init process Jul 2 07:55:27.157559 kernel: with arguments: Jul 2 07:55:27.157590 kernel: /init Jul 2 07:55:27.157603 kernel: with environment: Jul 2 07:55:27.157616 kernel: HOME=/ Jul 2 07:55:27.157633 kernel: TERM=linux Jul 2 07:55:27.157646 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 07:55:27.157665 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:55:27.157681 systemd[1]: Detected virtualization kvm. Jul 2 07:55:27.157696 systemd[1]: Detected architecture x86-64. Jul 2 07:55:27.157711 systemd[1]: Running in initrd. Jul 2 07:55:27.157726 systemd[1]: No hostname configured, using default hostname. Jul 2 07:55:27.157740 systemd[1]: Hostname set to . Jul 2 07:55:27.157760 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:55:27.157774 systemd[1]: Queued start job for default target initrd.target. Jul 2 07:55:27.157784 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:55:27.157793 systemd[1]: Reached target cryptsetup.target. Jul 2 07:55:27.157803 systemd[1]: Reached target paths.target. Jul 2 07:55:27.157812 systemd[1]: Reached target slices.target. Jul 2 07:55:27.157822 systemd[1]: Reached target swap.target. Jul 2 07:55:27.157831 systemd[1]: Reached target timers.target. Jul 2 07:55:27.157846 systemd[1]: Listening on iscsid.socket. Jul 2 07:55:27.157856 systemd[1]: Listening on iscsiuio.socket. Jul 2 07:55:27.157865 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:55:27.157875 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:55:27.157885 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:55:27.157894 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:55:27.157904 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:55:27.157913 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:55:27.157926 systemd[1]: Reached target sockets.target. Jul 2 07:55:27.157935 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:55:27.157948 systemd[1]: Finished network-cleanup.service. Jul 2 07:55:27.157958 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 07:55:27.157968 systemd[1]: Starting systemd-journald.service... Jul 2 07:55:27.157980 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:55:27.157990 systemd[1]: Starting systemd-resolved.service... Jul 2 07:55:27.157999 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 07:55:27.158009 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:55:27.158019 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 07:55:27.158037 systemd-journald[184]: Journal started Jul 2 07:55:27.158113 systemd-journald[184]: Runtime Journal (/run/log/journal/cbfb8a3605324bafb6d02ac44d1bf712) is 4.9M, max 39.5M, 34.5M free. Jul 2 07:55:27.143535 systemd-modules-load[185]: Inserted module 'overlay' Jul 2 07:55:27.185816 systemd[1]: Started systemd-journald.service. Jul 2 07:55:27.166686 systemd-resolved[186]: Positive Trust Anchors: Jul 2 07:55:27.166703 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:55:27.192886 kernel: audit: type=1130 audit(1719906927.181:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.192919 kernel: audit: type=1130 audit(1719906927.183:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.166748 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:55:27.206420 kernel: audit: type=1130 audit(1719906927.184:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.206472 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 07:55:27.170718 systemd-resolved[186]: Defaulting to hostname 'linux'. Jul 2 07:55:27.183926 systemd[1]: Started systemd-resolved.service. Jul 2 07:55:27.184453 systemd[1]: Reached target nss-lookup.target. Jul 2 07:55:27.193837 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:55:27.214719 kernel: audit: type=1130 audit(1719906927.210:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.208144 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 07:55:27.221552 kernel: Bridge firewalling registered Jul 2 07:55:27.214205 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 07:55:27.217056 systemd-modules-load[185]: Inserted module 'br_netfilter' Jul 2 07:55:27.221450 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:55:27.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.227307 kernel: audit: type=1130 audit(1719906927.221:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.243959 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 07:55:27.250344 kernel: audit: type=1130 audit(1719906927.244:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.247457 systemd[1]: Starting dracut-cmdline.service... Jul 2 07:55:27.259289 kernel: SCSI subsystem initialized Jul 2 07:55:27.265700 dracut-cmdline[201]: dracut-dracut-053 Jul 2 07:55:27.271648 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 07:55:27.276272 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 07:55:27.276376 kernel: device-mapper: uevent: version 1.0.3 Jul 2 07:55:27.286303 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 07:55:27.290637 systemd-modules-load[185]: Inserted module 'dm_multipath' Jul 2 07:55:27.291668 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:55:27.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.293477 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:55:27.301929 kernel: audit: type=1130 audit(1719906927.292:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.310134 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:55:27.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.315510 kernel: audit: type=1130 audit(1719906927.311:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.398374 kernel: Loading iSCSI transport class v2.0-870. Jul 2 07:55:27.423272 kernel: iscsi: registered transport (tcp) Jul 2 07:55:27.462365 kernel: iscsi: registered transport (qla4xxx) Jul 2 07:55:27.462455 kernel: QLogic iSCSI HBA Driver Jul 2 07:55:27.525552 systemd[1]: Finished dracut-cmdline.service. Jul 2 07:55:27.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.529289 kernel: audit: type=1130 audit(1719906927.525:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.527963 systemd[1]: Starting dracut-pre-udev.service... Jul 2 07:55:27.591360 kernel: raid6: avx2x4 gen() 17040 MB/s Jul 2 07:55:27.608338 kernel: raid6: avx2x4 xor() 5132 MB/s Jul 2 07:55:27.625324 kernel: raid6: avx2x2 gen() 17866 MB/s Jul 2 07:55:27.642342 kernel: raid6: avx2x2 xor() 15027 MB/s Jul 2 07:55:27.659330 kernel: raid6: avx2x1 gen() 14632 MB/s Jul 2 07:55:27.676322 kernel: raid6: avx2x1 xor() 12617 MB/s Jul 2 07:55:27.693329 kernel: raid6: sse2x4 gen() 8942 MB/s Jul 2 07:55:27.719860 kernel: raid6: sse2x4 xor() 4865 MB/s Jul 2 07:55:27.736330 kernel: raid6: sse2x2 gen() 8481 MB/s Jul 2 07:55:27.753339 kernel: raid6: sse2x2 xor() 5729 MB/s Jul 2 07:55:27.770429 kernel: raid6: sse2x1 gen() 7870 MB/s Jul 2 07:55:27.787922 kernel: raid6: sse2x1 xor() 4827 MB/s Jul 2 07:55:27.788065 kernel: raid6: using algorithm avx2x2 gen() 17866 MB/s Jul 2 07:55:27.788089 kernel: raid6: .... xor() 15027 MB/s, rmw enabled Jul 2 07:55:27.788646 kernel: raid6: using avx2x2 recovery algorithm Jul 2 07:55:27.807305 kernel: xor: automatically using best checksumming function avx Jul 2 07:55:27.951332 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 07:55:27.967866 systemd[1]: Finished dracut-pre-udev.service. Jul 2 07:55:27.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:27.968000 audit: BPF prog-id=7 op=LOAD Jul 2 07:55:27.968000 audit: BPF prog-id=8 op=LOAD Jul 2 07:55:27.970055 systemd[1]: Starting systemd-udevd.service... Jul 2 07:55:27.989513 systemd-udevd[383]: Using default interface naming scheme 'v252'. Jul 2 07:55:27.998432 systemd[1]: Started systemd-udevd.service. Jul 2 07:55:27.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.000469 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 07:55:28.019845 dracut-pre-trigger[385]: rd.md=0: removing MD RAID activation Jul 2 07:55:28.075129 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 07:55:28.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.076784 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:55:28.147095 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:55:28.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:28.255721 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Jul 2 07:55:28.256266 kernel: libata version 3.00 loaded. Jul 2 07:55:28.261279 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 07:55:28.271267 kernel: scsi host0: Virtio SCSI HBA Jul 2 07:55:28.292495 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 07:55:28.292601 kernel: GPT:9289727 != 125829119 Jul 2 07:55:28.292622 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 07:55:28.292642 kernel: GPT:9289727 != 125829119 Jul 2 07:55:28.292673 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 07:55:28.292691 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:55:28.293782 kernel: ata_piix 0000:00:01.1: version 2.13 Jul 2 07:55:28.310300 kernel: scsi host1: ata_piix Jul 2 07:55:28.314355 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 07:55:28.317429 kernel: virtio_blk virtio5: [vdb] 920 512-byte logical blocks (471 kB/460 KiB) Jul 2 07:55:28.317815 kernel: AES CTR mode by8 optimization enabled Jul 2 07:55:28.318900 kernel: scsi host2: ata_piix Jul 2 07:55:28.321905 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Jul 2 07:55:28.321997 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Jul 2 07:55:28.324276 kernel: ACPI: bus type USB registered Jul 2 07:55:28.324354 kernel: usbcore: registered new interface driver usbfs Jul 2 07:55:28.327085 kernel: usbcore: registered new interface driver hub Jul 2 07:55:28.327175 kernel: usbcore: registered new device driver usb Jul 2 07:55:28.527292 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Jul 2 07:55:28.527701 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 07:55:28.537286 kernel: ehci-pci: EHCI PCI platform driver Jul 2 07:55:28.542650 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 07:55:28.543847 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 07:55:28.552281 kernel: uhci_hcd: USB Universal Host Controller Interface driver Jul 2 07:55:28.554291 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (436) Jul 2 07:55:28.556427 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 07:55:28.560331 systemd[1]: Starting disk-uuid.service... Jul 2 07:55:28.570741 disk-uuid[513]: Primary Header is updated. Jul 2 07:55:28.570741 disk-uuid[513]: Secondary Entries is updated. Jul 2 07:55:28.570741 disk-uuid[513]: Secondary Header is updated. Jul 2 07:55:28.582850 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:55:28.589650 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jul 2 07:55:28.590062 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jul 2 07:55:28.590211 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jul 2 07:55:28.591943 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Jul 2 07:55:28.593866 kernel: hub 1-0:1.0: USB hub found Jul 2 07:55:28.594352 kernel: hub 1-0:1.0: 2 ports detected Jul 2 07:55:28.596267 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:55:29.582384 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 07:55:29.583208 disk-uuid[514]: The operation has completed successfully. Jul 2 07:55:29.626423 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 07:55:29.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.626602 systemd[1]: Finished disk-uuid.service. Jul 2 07:55:29.628570 systemd[1]: Starting verity-setup.service... Jul 2 07:55:29.649508 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 07:55:29.704842 systemd[1]: Found device dev-mapper-usr.device. Jul 2 07:55:29.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.707821 systemd[1]: Mounting sysusr-usr.mount... Jul 2 07:55:29.708466 systemd[1]: Finished verity-setup.service. Jul 2 07:55:29.801296 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 07:55:29.800926 systemd[1]: Mounted sysusr-usr.mount. Jul 2 07:55:29.801617 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 07:55:29.802911 systemd[1]: Starting ignition-setup.service... Jul 2 07:55:29.804631 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 07:55:29.821737 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:55:29.821830 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:55:29.821853 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:55:29.840923 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 07:55:29.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:29.849183 systemd[1]: Finished ignition-setup.service. Jul 2 07:55:29.851366 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 07:55:30.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.020000 audit: BPF prog-id=9 op=LOAD Jul 2 07:55:30.017541 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 07:55:30.024966 systemd[1]: Starting systemd-networkd.service... Jul 2 07:55:30.025595 ignition[604]: Ignition 2.14.0 Jul 2 07:55:30.025606 ignition[604]: Stage: fetch-offline Jul 2 07:55:30.025680 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:30.025710 ignition[604]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:30.032103 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:30.034491 ignition[604]: parsed url from cmdline: "" Jul 2 07:55:30.034506 ignition[604]: no config URL provided Jul 2 07:55:30.037041 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 07:55:30.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.034517 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:55:30.034533 ignition[604]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:55:30.034543 ignition[604]: failed to fetch config: resource requires networking Jul 2 07:55:30.034700 ignition[604]: Ignition finished successfully Jul 2 07:55:30.058976 systemd-networkd[688]: lo: Link UP Jul 2 07:55:30.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.058993 systemd-networkd[688]: lo: Gained carrier Jul 2 07:55:30.059851 systemd-networkd[688]: Enumeration completed Jul 2 07:55:30.060482 systemd-networkd[688]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 07:55:30.060572 systemd[1]: Started systemd-networkd.service. Jul 2 07:55:30.061498 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Jul 2 07:55:30.062156 systemd[1]: Reached target network.target. Jul 2 07:55:30.062979 systemd-networkd[688]: eth1: Link UP Jul 2 07:55:30.062985 systemd-networkd[688]: eth1: Gained carrier Jul 2 07:55:30.064943 systemd[1]: Starting ignition-fetch.service... Jul 2 07:55:30.066718 systemd[1]: Starting iscsiuio.service... Jul 2 07:55:30.084784 systemd-networkd[688]: eth0: Link UP Jul 2 07:55:30.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.084792 systemd-networkd[688]: eth0: Gained carrier Jul 2 07:55:30.088349 systemd[1]: Started iscsiuio.service. Jul 2 07:55:30.092441 systemd[1]: Starting iscsid.service... Jul 2 07:55:30.098979 ignition[690]: Ignition 2.14.0 Jul 2 07:55:30.101560 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:55:30.101560 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 07:55:30.101560 iscsid[698]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 07:55:30.101560 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 07:55:30.101560 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 07:55:30.101560 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 07:55:30.101560 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 07:55:30.098991 ignition[690]: Stage: fetch Jul 2 07:55:30.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.102452 systemd-networkd[688]: eth0: DHCPv4 address 64.23.144.187/20, gateway 64.23.144.1 acquired from 169.254.169.253 Jul 2 07:55:30.102152 ignition[690]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:30.106920 systemd[1]: Started iscsid.service. Jul 2 07:55:30.102193 ignition[690]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:30.107063 systemd-networkd[688]: eth1: DHCPv4 address 10.124.0.19/20 acquired from 169.254.169.253 Jul 2 07:55:30.105693 ignition[690]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:30.111454 systemd[1]: Starting dracut-initqueue.service... Jul 2 07:55:30.105860 ignition[690]: parsed url from cmdline: "" Jul 2 07:55:30.105867 ignition[690]: no config URL provided Jul 2 07:55:30.105875 ignition[690]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 07:55:30.105887 ignition[690]: no config at "/usr/lib/ignition/user.ign" Jul 2 07:55:30.105934 ignition[690]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Jul 2 07:55:30.136423 systemd[1]: Finished dracut-initqueue.service. Jul 2 07:55:30.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.137166 systemd[1]: Reached target remote-fs-pre.target. Jul 2 07:55:30.137725 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:55:30.138573 systemd[1]: Reached target remote-fs.target. Jul 2 07:55:30.140952 systemd[1]: Starting dracut-pre-mount.service... Jul 2 07:55:30.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.155245 systemd[1]: Finished dracut-pre-mount.service. Jul 2 07:55:30.156773 ignition[690]: GET result: OK Jul 2 07:55:30.156879 ignition[690]: parsing config with SHA512: 70d9438f63ed9051a961d507d718c4a59dd33a5fe056535ac9fed92daaf65866da6aa1bf86d7db649b8d695af4bae2f5c2fad288cb71a38a3646bd305bee7238 Jul 2 07:55:30.168058 unknown[690]: fetched base config from "system" Jul 2 07:55:30.168072 unknown[690]: fetched base config from "system" Jul 2 07:55:30.168600 ignition[690]: fetch: fetch complete Jul 2 07:55:30.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.168081 unknown[690]: fetched user config from "digitalocean" Jul 2 07:55:30.168608 ignition[690]: fetch: fetch passed Jul 2 07:55:30.171713 systemd[1]: Finished ignition-fetch.service. Jul 2 07:55:30.168676 ignition[690]: Ignition finished successfully Jul 2 07:55:30.173681 systemd[1]: Starting ignition-kargs.service... Jul 2 07:55:30.188610 ignition[713]: Ignition 2.14.0 Jul 2 07:55:30.188621 ignition[713]: Stage: kargs Jul 2 07:55:30.188773 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:30.188800 ignition[713]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:30.191267 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:30.193867 ignition[713]: kargs: kargs passed Jul 2 07:55:30.195622 systemd[1]: Finished ignition-kargs.service. Jul 2 07:55:30.193972 ignition[713]: Ignition finished successfully Jul 2 07:55:30.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.197775 systemd[1]: Starting ignition-disks.service... Jul 2 07:55:30.213496 ignition[719]: Ignition 2.14.0 Jul 2 07:55:30.213509 ignition[719]: Stage: disks Jul 2 07:55:30.213669 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:30.213689 ignition[719]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:30.216050 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:30.217318 ignition[719]: disks: disks passed Jul 2 07:55:30.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.218654 systemd[1]: Finished ignition-disks.service. Jul 2 07:55:30.217400 ignition[719]: Ignition finished successfully Jul 2 07:55:30.219272 systemd[1]: Reached target initrd-root-device.target. Jul 2 07:55:30.219711 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:55:30.220131 systemd[1]: Reached target local-fs.target. Jul 2 07:55:30.220493 systemd[1]: Reached target sysinit.target. Jul 2 07:55:30.220816 systemd[1]: Reached target basic.target. Jul 2 07:55:30.222730 systemd[1]: Starting systemd-fsck-root.service... Jul 2 07:55:30.243288 systemd-fsck[727]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 07:55:30.246993 systemd[1]: Finished systemd-fsck-root.service. Jul 2 07:55:30.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.248995 systemd[1]: Mounting sysroot.mount... Jul 2 07:55:30.262376 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 07:55:30.262733 systemd[1]: Mounted sysroot.mount. Jul 2 07:55:30.263342 systemd[1]: Reached target initrd-root-fs.target. Jul 2 07:55:30.265542 systemd[1]: Mounting sysroot-usr.mount... Jul 2 07:55:30.267319 systemd[1]: Starting flatcar-digitalocean-network.service... Jul 2 07:55:30.269402 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 07:55:30.269861 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 07:55:30.269912 systemd[1]: Reached target ignition-diskful.target. Jul 2 07:55:30.275800 systemd[1]: Mounted sysroot-usr.mount. Jul 2 07:55:30.279335 systemd[1]: Starting initrd-setup-root.service... Jul 2 07:55:30.287471 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 07:55:30.303105 initrd-setup-root[747]: cut: /sysroot/etc/group: No such file or directory Jul 2 07:55:30.315615 initrd-setup-root[755]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 07:55:30.322538 initrd-setup-root[765]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 07:55:30.416759 coreos-metadata[733]: Jul 02 07:55:30.416 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:55:30.423897 systemd[1]: Finished initrd-setup-root.service. Jul 2 07:55:30.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.425284 systemd[1]: Starting ignition-mount.service... Jul 2 07:55:30.426695 systemd[1]: Starting sysroot-boot.service... Jul 2 07:55:30.431302 coreos-metadata[733]: Jul 02 07:55:30.431 INFO Fetch successful Jul 2 07:55:30.441780 bash[784]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 07:55:30.451648 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Jul 2 07:55:30.451782 systemd[1]: Finished flatcar-digitalocean-network.service. Jul 2 07:55:30.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.454501 coreos-metadata[734]: Jul 02 07:55:30.454 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:55:30.467510 ignition[786]: INFO : Ignition 2.14.0 Jul 2 07:55:30.469408 ignition[786]: INFO : Stage: mount Jul 2 07:55:30.469408 ignition[786]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:30.469408 ignition[786]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:30.472751 coreos-metadata[734]: Jul 02 07:55:30.469 INFO Fetch successful Jul 2 07:55:30.471599 systemd[1]: Finished sysroot-boot.service. Jul 2 07:55:30.473596 ignition[786]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:30.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.474835 coreos-metadata[734]: Jul 02 07:55:30.473 INFO wrote hostname ci-3510.3.5-5-0ac503668a to /sysroot/etc/hostname Jul 2 07:55:30.475396 ignition[786]: INFO : mount: mount passed Jul 2 07:55:30.475396 ignition[786]: INFO : Ignition finished successfully Jul 2 07:55:30.475984 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 07:55:30.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.477358 systemd[1]: Finished ignition-mount.service. Jul 2 07:55:30.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:30.725375 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 07:55:30.736307 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (795) Jul 2 07:55:30.739658 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 07:55:30.739746 kernel: BTRFS info (device vda6): using free space tree Jul 2 07:55:30.739771 kernel: BTRFS info (device vda6): has skinny extents Jul 2 07:55:30.744859 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 07:55:30.748613 systemd[1]: Starting ignition-files.service... Jul 2 07:55:30.771947 ignition[815]: INFO : Ignition 2.14.0 Jul 2 07:55:30.771947 ignition[815]: INFO : Stage: files Jul 2 07:55:30.773386 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:30.773386 ignition[815]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:30.775178 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:30.777795 ignition[815]: DEBUG : files: compiled without relabeling support, skipping Jul 2 07:55:30.779556 ignition[815]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 07:55:30.779556 ignition[815]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 07:55:30.782762 ignition[815]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 07:55:30.783742 ignition[815]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 07:55:30.784555 ignition[815]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 07:55:30.784390 unknown[815]: wrote ssh authorized keys file for user: core Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:55:30.786158 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-x86-64.raw: attempt #1 Jul 2 07:55:31.288428 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Jul 2 07:55:31.296481 systemd-networkd[688]: eth1: Gained IPv6LL Jul 2 07:55:31.567723 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw" Jul 2 07:55:31.568728 ignition[815]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:55:31.569330 ignition[815]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 07:55:31.569937 ignition[815]: INFO : files: op(9): [started] processing unit "containerd.service" Jul 2 07:55:31.571106 ignition[815]: INFO : files: op(9): op(a): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Jul 2 07:55:31.572209 ignition[815]: INFO : files: op(9): op(a): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Jul 2 07:55:31.573175 ignition[815]: INFO : files: op(9): [finished] processing unit "containerd.service" Jul 2 07:55:31.575330 ignition[815]: INFO : files: op(b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:55:31.575330 ignition[815]: INFO : files: op(b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 07:55:31.582116 ignition[815]: INFO : files: createResultFile: createFiles: op(c): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:55:31.583080 ignition[815]: INFO : files: createResultFile: createFiles: op(c): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 07:55:31.583080 ignition[815]: INFO : files: files passed Jul 2 07:55:31.583080 ignition[815]: INFO : Ignition finished successfully Jul 2 07:55:31.584681 systemd[1]: Finished ignition-files.service. Jul 2 07:55:31.593048 kernel: kauditd_printk_skb: 28 callbacks suppressed Jul 2 07:55:31.593095 kernel: audit: type=1130 audit(1719906931.585:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.586524 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 07:55:31.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.600297 kernel: audit: type=1130 audit(1719906931.597:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.589951 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 07:55:31.603925 kernel: audit: type=1131 audit(1719906931.599:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.604006 initrd-setup-root-after-ignition[840]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 07:55:31.607638 kernel: audit: type=1130 audit(1719906931.604:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.591309 systemd[1]: Starting ignition-quench.service... Jul 2 07:55:31.595351 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 07:55:31.595509 systemd[1]: Finished ignition-quench.service. Jul 2 07:55:31.600584 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 07:55:31.604666 systemd[1]: Reached target ignition-complete.target. Jul 2 07:55:31.609485 systemd[1]: Starting initrd-parse-etc.service... Jul 2 07:55:31.633532 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 07:55:31.634610 systemd[1]: Finished initrd-parse-etc.service. Jul 2 07:55:31.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.637647 systemd[1]: Reached target initrd-fs.target. Jul 2 07:55:31.641898 kernel: audit: type=1130 audit(1719906931.635:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.641939 kernel: audit: type=1131 audit(1719906931.637:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.641333 systemd[1]: Reached target initrd.target. Jul 2 07:55:31.642387 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 07:55:31.643944 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 07:55:31.662539 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 07:55:31.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.665113 systemd[1]: Starting initrd-cleanup.service... Jul 2 07:55:31.666696 kernel: audit: type=1130 audit(1719906931.663:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.678501 systemd[1]: Stopped target nss-lookup.target. Jul 2 07:55:31.679644 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 07:55:31.680922 systemd[1]: Stopped target timers.target. Jul 2 07:55:31.681901 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 07:55:31.682666 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 07:55:31.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.684482 systemd[1]: Stopped target initrd.target. Jul 2 07:55:31.687299 kernel: audit: type=1131 audit(1719906931.683:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.687054 systemd[1]: Stopped target basic.target. Jul 2 07:55:31.687682 systemd[1]: Stopped target ignition-complete.target. Jul 2 07:55:31.688404 systemd[1]: Stopped target ignition-diskful.target. Jul 2 07:55:31.689055 systemd[1]: Stopped target initrd-root-device.target. Jul 2 07:55:31.689732 systemd[1]: Stopped target remote-fs.target. Jul 2 07:55:31.690532 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 07:55:31.691314 systemd[1]: Stopped target sysinit.target. Jul 2 07:55:31.692039 systemd[1]: Stopped target local-fs.target. Jul 2 07:55:31.692798 systemd[1]: Stopped target local-fs-pre.target. Jul 2 07:55:31.693513 systemd[1]: Stopped target swap.target. Jul 2 07:55:31.694093 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 07:55:31.694376 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 07:55:31.697620 kernel: audit: type=1131 audit(1719906931.695:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.695481 systemd[1]: Stopped target cryptsetup.target. Jul 2 07:55:31.698079 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 07:55:31.698383 systemd[1]: Stopped dracut-initqueue.service. Jul 2 07:55:31.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.706034 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 07:55:31.708965 kernel: audit: type=1131 audit(1719906931.705:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.706520 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 07:55:31.710179 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 07:55:31.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.710499 systemd[1]: Stopped ignition-files.service. Jul 2 07:55:31.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.711469 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 07:55:31.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.711602 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 07:55:31.713725 systemd[1]: Stopping ignition-mount.service... Jul 2 07:55:31.714701 systemd[1]: Stopping iscsid.service... Jul 2 07:55:31.721603 iscsid[698]: iscsid shutting down. Jul 2 07:55:31.723432 systemd[1]: Stopping sysroot-boot.service... Jul 2 07:55:31.723902 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 07:55:31.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.724141 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 07:55:31.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.725351 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 07:55:31.725502 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 07:55:31.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.740491 ignition[853]: INFO : Ignition 2.14.0 Jul 2 07:55:31.740491 ignition[853]: INFO : Stage: umount Jul 2 07:55:31.740491 ignition[853]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 07:55:31.740491 ignition[853]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Jul 2 07:55:31.731302 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 07:55:31.731488 systemd[1]: Stopped iscsid.service. Jul 2 07:55:31.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.732612 systemd[1]: Stopping iscsiuio.service... Jul 2 07:55:31.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.752731 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Jul 2 07:55:31.752731 ignition[853]: INFO : umount: umount passed Jul 2 07:55:31.752731 ignition[853]: INFO : Ignition finished successfully Jul 2 07:55:31.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.742644 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 07:55:31.743098 systemd[1]: Stopped iscsiuio.service. Jul 2 07:55:31.746180 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 07:55:31.746441 systemd[1]: Finished initrd-cleanup.service. Jul 2 07:55:31.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.748399 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 07:55:31.748538 systemd[1]: Stopped ignition-mount.service. Jul 2 07:55:31.750379 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 07:55:31.750496 systemd[1]: Stopped ignition-disks.service. Jul 2 07:55:31.750939 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 07:55:31.750983 systemd[1]: Stopped ignition-kargs.service. Jul 2 07:55:31.751400 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 2 07:55:31.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.751458 systemd[1]: Stopped ignition-fetch.service. Jul 2 07:55:31.751851 systemd[1]: Stopped target network.target. Jul 2 07:55:31.786000 audit: BPF prog-id=6 op=UNLOAD Jul 2 07:55:31.752119 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 07:55:31.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.752171 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 07:55:31.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.753139 systemd[1]: Stopped target paths.target. Jul 2 07:55:31.753418 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 07:55:31.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.755329 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 07:55:31.756012 systemd[1]: Stopped target slices.target. Jul 2 07:55:31.757381 systemd[1]: Stopped target sockets.target. Jul 2 07:55:31.771036 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 07:55:31.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.771107 systemd[1]: Closed iscsid.socket. Jul 2 07:55:31.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.771703 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 07:55:31.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.771762 systemd[1]: Closed iscsiuio.socket. Jul 2 07:55:31.772079 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 07:55:31.772154 systemd[1]: Stopped ignition-setup.service. Jul 2 07:55:31.773875 systemd[1]: Stopping systemd-networkd.service... Jul 2 07:55:31.774549 systemd[1]: Stopping systemd-resolved.service... Jul 2 07:55:31.776444 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 07:55:31.780332 systemd-networkd[688]: eth0: DHCPv6 lease lost Jul 2 07:55:31.782376 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 07:55:31.782564 systemd[1]: Stopped systemd-resolved.service. Jul 2 07:55:31.784340 systemd-networkd[688]: eth1: DHCPv6 lease lost Jul 2 07:55:31.803000 audit: BPF prog-id=9 op=UNLOAD Jul 2 07:55:31.785751 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 07:55:31.785905 systemd[1]: Stopped systemd-networkd.service. Jul 2 07:55:31.787366 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 07:55:31.787484 systemd[1]: Stopped sysroot-boot.service. Jul 2 07:55:31.788594 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 07:55:31.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.788640 systemd[1]: Closed systemd-networkd.socket. Jul 2 07:55:31.789103 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 07:55:31.789173 systemd[1]: Stopped initrd-setup-root.service. Jul 2 07:55:31.790899 systemd[1]: Stopping network-cleanup.service... Jul 2 07:55:31.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.791485 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 07:55:31.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.791590 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 07:55:31.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.792365 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 07:55:31.792418 systemd[1]: Stopped systemd-sysctl.service. Jul 2 07:55:31.793157 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 07:55:31.793207 systemd[1]: Stopped systemd-modules-load.service. Jul 2 07:55:31.797730 systemd[1]: Stopping systemd-udevd.service... Jul 2 07:55:31.799919 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 07:55:31.805553 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 07:55:31.805799 systemd[1]: Stopped systemd-udevd.service. Jul 2 07:55:31.806928 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 07:55:31.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.806967 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 07:55:31.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.807653 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 07:55:31.807683 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 07:55:31.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.808257 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 07:55:31.808312 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 07:55:31.808865 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 07:55:31.808903 systemd[1]: Stopped dracut-cmdline.service. Jul 2 07:55:31.809434 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 07:55:31.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.809473 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 07:55:31.813524 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 07:55:31.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:31.824419 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 07:55:31.824545 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 07:55:31.825573 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 07:55:31.825638 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 07:55:31.826071 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 07:55:31.826130 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 07:55:31.828324 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 07:55:31.829021 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 07:55:31.829155 systemd[1]: Stopped network-cleanup.service. Jul 2 07:55:31.830174 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 07:55:31.830474 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 07:55:31.831511 systemd[1]: Reached target initrd-switch-root.target. Jul 2 07:55:31.833321 systemd[1]: Starting initrd-switch-root.service... Jul 2 07:55:31.845838 systemd[1]: Switching root. Jul 2 07:55:31.846000 audit: BPF prog-id=8 op=UNLOAD Jul 2 07:55:31.846000 audit: BPF prog-id=7 op=UNLOAD Jul 2 07:55:31.851000 audit: BPF prog-id=5 op=UNLOAD Jul 2 07:55:31.851000 audit: BPF prog-id=4 op=UNLOAD Jul 2 07:55:31.851000 audit: BPF prog-id=3 op=UNLOAD Jul 2 07:55:31.869322 systemd-journald[184]: Journal stopped Jul 2 07:55:35.589045 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Jul 2 07:55:35.589175 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 07:55:35.589196 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 07:55:35.589209 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 07:55:35.589222 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 07:55:35.589254 kernel: SELinux: policy capability open_perms=1 Jul 2 07:55:35.589266 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 07:55:35.589278 kernel: SELinux: policy capability always_check_network=0 Jul 2 07:55:35.589290 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 07:55:35.589302 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 07:55:35.589314 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 07:55:35.589333 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 07:55:35.589350 systemd[1]: Successfully loaded SELinux policy in 62.871ms. Jul 2 07:55:35.589372 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.083ms. Jul 2 07:55:35.589387 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 07:55:35.589400 systemd[1]: Detected virtualization kvm. Jul 2 07:55:35.589412 systemd[1]: Detected architecture x86-64. Jul 2 07:55:35.589426 systemd[1]: Detected first boot. Jul 2 07:55:35.589439 systemd[1]: Hostname set to . Jul 2 07:55:35.589454 systemd[1]: Initializing machine ID from VM UUID. Jul 2 07:55:35.589467 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 07:55:35.589479 systemd[1]: Populated /etc with preset unit settings. Jul 2 07:55:35.589502 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:55:35.589522 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:55:35.589535 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:55:35.589549 systemd[1]: Queued start job for default target multi-user.target. Jul 2 07:55:35.589564 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 07:55:35.589576 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 07:55:35.589588 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 07:55:35.589600 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 07:55:35.589613 systemd[1]: Created slice system-getty.slice. Jul 2 07:55:35.589626 systemd[1]: Created slice system-modprobe.slice. Jul 2 07:55:35.589639 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 07:55:35.589651 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 07:55:35.589664 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 07:55:35.589679 systemd[1]: Created slice user.slice. Jul 2 07:55:35.589691 systemd[1]: Started systemd-ask-password-console.path. Jul 2 07:55:35.589703 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 07:55:35.589716 systemd[1]: Set up automount boot.automount. Jul 2 07:55:35.589729 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 07:55:35.589741 systemd[1]: Reached target integritysetup.target. Jul 2 07:55:35.589755 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 07:55:35.589768 systemd[1]: Reached target remote-fs.target. Jul 2 07:55:35.589785 systemd[1]: Reached target slices.target. Jul 2 07:55:35.589798 systemd[1]: Reached target swap.target. Jul 2 07:55:35.589810 systemd[1]: Reached target torcx.target. Jul 2 07:55:35.589822 systemd[1]: Reached target veritysetup.target. Jul 2 07:55:35.589834 systemd[1]: Listening on systemd-coredump.socket. Jul 2 07:55:35.589846 systemd[1]: Listening on systemd-initctl.socket. Jul 2 07:55:35.589858 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 07:55:35.589870 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 07:55:35.589885 systemd[1]: Listening on systemd-journald.socket. Jul 2 07:55:35.589898 systemd[1]: Listening on systemd-networkd.socket. Jul 2 07:55:35.589911 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 07:55:35.589922 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 07:55:35.589935 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 07:55:35.589947 systemd[1]: Mounting dev-hugepages.mount... Jul 2 07:55:35.589959 systemd[1]: Mounting dev-mqueue.mount... Jul 2 07:55:35.589972 systemd[1]: Mounting media.mount... Jul 2 07:55:35.589985 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:35.590000 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 07:55:35.590012 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 07:55:35.590024 systemd[1]: Mounting tmp.mount... Jul 2 07:55:35.590036 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 07:55:35.590055 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:55:35.590073 systemd[1]: Starting kmod-static-nodes.service... Jul 2 07:55:35.590090 systemd[1]: Starting modprobe@configfs.service... Jul 2 07:55:35.590109 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:55:35.590122 systemd[1]: Starting modprobe@drm.service... Jul 2 07:55:35.590137 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:55:35.590149 systemd[1]: Starting modprobe@fuse.service... Jul 2 07:55:35.590161 systemd[1]: Starting modprobe@loop.service... Jul 2 07:55:35.590173 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:55:35.590185 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Jul 2 07:55:35.590197 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Jul 2 07:55:35.590209 systemd[1]: Starting systemd-journald.service... Jul 2 07:55:35.590222 systemd[1]: Starting systemd-modules-load.service... Jul 2 07:55:35.590263 systemd[1]: Starting systemd-network-generator.service... Jul 2 07:55:35.590284 systemd[1]: Starting systemd-remount-fs.service... Jul 2 07:55:35.590297 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 07:55:35.590310 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:35.590322 systemd[1]: Mounted dev-hugepages.mount. Jul 2 07:55:35.590335 systemd[1]: Mounted dev-mqueue.mount. Jul 2 07:55:35.590348 systemd[1]: Mounted media.mount. Jul 2 07:55:35.590361 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 07:55:35.590380 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 07:55:35.590393 systemd[1]: Mounted tmp.mount. Jul 2 07:55:35.590408 systemd[1]: Finished kmod-static-nodes.service. Jul 2 07:55:35.590421 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 07:55:35.590434 systemd[1]: Finished modprobe@configfs.service. Jul 2 07:55:35.590446 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:55:35.590459 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:55:35.590471 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:55:35.590483 systemd[1]: Finished modprobe@drm.service. Jul 2 07:55:35.590495 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:55:35.590507 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:55:35.590522 systemd[1]: Finished systemd-network-generator.service. Jul 2 07:55:35.590534 systemd[1]: Finished systemd-remount-fs.service. Jul 2 07:55:35.590546 systemd[1]: Finished systemd-modules-load.service. Jul 2 07:55:35.590559 systemd[1]: Reached target network-pre.target. Jul 2 07:55:35.590572 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 07:55:35.590587 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:55:35.590599 kernel: fuse: init (API version 7.34) Jul 2 07:55:35.590611 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 07:55:35.590623 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:55:35.590635 systemd[1]: Starting systemd-random-seed.service... Jul 2 07:55:35.590652 systemd[1]: Starting systemd-sysctl.service... Jul 2 07:55:35.590664 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 07:55:35.590683 systemd-journald[989]: Journal started Jul 2 07:55:35.590759 systemd-journald[989]: Runtime Journal (/run/log/journal/cbfb8a3605324bafb6d02ac44d1bf712) is 4.9M, max 39.5M, 34.5M free. Jul 2 07:55:35.367000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 07:55:35.367000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Jul 2 07:55:35.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.619433 systemd[1]: Started systemd-journald.service. Jul 2 07:55:35.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.619703 systemd-journald[989]: Time spent on flushing to /var/log/journal/cbfb8a3605324bafb6d02ac44d1bf712 is 43.416ms for 1050 entries. Jul 2 07:55:35.619703 systemd-journald[989]: System Journal (/var/log/journal/cbfb8a3605324bafb6d02ac44d1bf712) is 8.0M, max 195.6M, 187.6M free. Jul 2 07:55:35.690333 systemd-journald[989]: Received client request to flush runtime journal. Jul 2 07:55:35.690441 kernel: loop: module loaded Jul 2 07:55:35.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.587000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 07:55:35.587000 audit[989]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff84cffcb0 a2=4000 a3=7fff84cffd4c items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:35.587000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:55:35.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.594081 systemd[1]: Starting systemd-journal-flush.service... Jul 2 07:55:35.595149 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 07:55:35.596152 systemd[1]: Finished modprobe@fuse.service. Jul 2 07:55:35.600981 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 07:55:35.609391 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 07:55:35.626210 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:55:35.626495 systemd[1]: Finished modprobe@loop.service. Jul 2 07:55:35.627154 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:55:35.636443 systemd[1]: Finished systemd-random-seed.service. Jul 2 07:55:35.636923 systemd[1]: Reached target first-boot-complete.target. Jul 2 07:55:35.649634 systemd[1]: Finished systemd-sysctl.service. Jul 2 07:55:35.692036 systemd[1]: Finished systemd-journal-flush.service. Jul 2 07:55:35.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.732934 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 07:55:35.736075 systemd[1]: Starting systemd-sysusers.service... Jul 2 07:55:35.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.760563 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 07:55:35.763613 systemd[1]: Starting systemd-udev-settle.service... Jul 2 07:55:35.779604 udevadm[1046]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 07:55:35.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.788708 systemd[1]: Finished systemd-sysusers.service. Jul 2 07:55:35.791500 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 07:55:35.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:35.826884 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 07:55:36.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.402573 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 07:55:36.404986 systemd[1]: Starting systemd-udevd.service... Jul 2 07:55:36.432127 systemd-udevd[1052]: Using default interface naming scheme 'v252'. Jul 2 07:55:36.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.463303 systemd[1]: Started systemd-udevd.service. Jul 2 07:55:36.466001 systemd[1]: Starting systemd-networkd.service... Jul 2 07:55:36.477845 systemd[1]: Starting systemd-userdbd.service... Jul 2 07:55:36.533385 systemd[1]: Found device dev-ttyS0.device. Jul 2 07:55:36.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.545197 systemd[1]: Started systemd-userdbd.service. Jul 2 07:55:36.608791 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:36.609214 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:55:36.613320 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:55:36.615971 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:55:36.647604 systemd[1]: Starting modprobe@loop.service... Jul 2 07:55:36.648172 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 07:55:36.648322 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 07:55:36.648469 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:36.649194 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:55:36.654076 kernel: kauditd_printk_skb: 82 callbacks suppressed Jul 2 07:55:36.654199 kernel: audit: type=1130 audit(1719906936.650:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.650283 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:55:36.659645 kernel: audit: type=1131 audit(1719906936.650:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.659722 kernel: audit: type=1130 audit(1719906936.658:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.651508 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:55:36.651750 systemd[1]: Finished modprobe@loop.service. Jul 2 07:55:36.659193 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:55:36.659507 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:55:36.671514 kernel: audit: type=1131 audit(1719906936.658:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.671650 kernel: audit: type=1130 audit(1719906936.665:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.671680 kernel: audit: type=1131 audit(1719906936.665:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.687627 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:55:36.687693 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:55:36.725298 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 2 07:55:36.736312 kernel: ACPI: button: Power Button [PWRF] Jul 2 07:55:36.773495 systemd-networkd[1058]: lo: Link UP Jul 2 07:55:36.773509 systemd-networkd[1058]: lo: Gained carrier Jul 2 07:55:36.774309 systemd-networkd[1058]: Enumeration completed Jul 2 07:55:36.774532 systemd[1]: Started systemd-networkd.service. Jul 2 07:55:36.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.778485 kernel: audit: type=1130 audit(1719906936.774:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:36.776414 systemd-networkd[1058]: eth1: Configuring with /run/systemd/network/10-6a:fd:25:03:73:ce.network. Jul 2 07:55:36.779125 systemd-networkd[1058]: eth0: Configuring with /run/systemd/network/10-66:83:33:7d:30:32.network. Jul 2 07:55:36.780040 systemd-networkd[1058]: eth1: Link UP Jul 2 07:55:36.780052 systemd-networkd[1058]: eth1: Gained carrier Jul 2 07:55:36.784707 systemd-networkd[1058]: eth0: Link UP Jul 2 07:55:36.784721 systemd-networkd[1058]: eth0: Gained carrier Jul 2 07:55:36.791977 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 07:55:36.786000 audit[1065]: AVC avc: denied { confidentiality } for pid=1065 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:55:36.798350 kernel: audit: type=1400 audit(1719906936.786:129): avc: denied { confidentiality } for pid=1065 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 07:55:36.808826 kernel: audit: type=1300 audit(1719906936.786:129): arch=c000003e syscall=175 success=yes exit=0 a0=55df05a47780 a1=3207c a2=7f8fc0ea7bc5 a3=5 items=108 ppid=1052 pid=1065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.809055 kernel: audit: type=1307 audit(1719906936.786:129): cwd="/" Jul 2 07:55:36.786000 audit[1065]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55df05a47780 a1=3207c a2=7f8fc0ea7bc5 a3=5 items=108 ppid=1052 pid=1065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:36.786000 audit: CWD cwd="/" Jul 2 07:55:36.786000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=1 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=2 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=3 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=4 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=5 name=(null) inode=14586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=6 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=7 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=8 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=9 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=10 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=11 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=12 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=13 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=14 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=15 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=16 name=(null) inode=14587 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=17 name=(null) inode=14592 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=18 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=19 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=20 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=21 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=22 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=23 name=(null) inode=14595 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=24 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=25 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=26 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=27 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=28 name=(null) inode=14593 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=29 name=(null) inode=14598 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=30 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=31 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=32 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=33 name=(null) inode=14600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=34 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=35 name=(null) inode=14601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=36 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=37 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=38 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=39 name=(null) inode=14603 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=40 name=(null) inode=14599 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=41 name=(null) inode=14604 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=42 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=43 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=44 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=45 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=46 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=47 name=(null) inode=14607 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=48 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=49 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=50 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=51 name=(null) inode=14609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=52 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=53 name=(null) inode=14610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=55 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=56 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=57 name=(null) inode=14612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=58 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=59 name=(null) inode=14613 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=60 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=61 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=62 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=63 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=64 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=65 name=(null) inode=14616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=66 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=67 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=68 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=69 name=(null) inode=14618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=70 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=71 name=(null) inode=14619 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=72 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=73 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=74 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=75 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=76 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=77 name=(null) inode=14622 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=78 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=79 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=80 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=81 name=(null) inode=14624 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=82 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=83 name=(null) inode=14625 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=84 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=85 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=86 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=87 name=(null) inode=14627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=88 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=89 name=(null) inode=14628 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=90 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=91 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=92 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=93 name=(null) inode=14630 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=94 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=95 name=(null) inode=14631 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=96 name=(null) inode=14611 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=97 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=98 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=99 name=(null) inode=14633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=100 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=101 name=(null) inode=14634 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=102 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=103 name=(null) inode=14635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=104 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=105 name=(null) inode=14636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=106 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PATH item=107 name=(null) inode=14637 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:55:36.786000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 07:55:36.818330 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jul 2 07:55:36.828274 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 2 07:55:36.865267 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 07:55:36.984292 kernel: EDAC MC: Ver: 3.0.0 Jul 2 07:55:37.008019 systemd[1]: Finished systemd-udev-settle.service. Jul 2 07:55:37.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.010515 systemd[1]: Starting lvm2-activation-early.service... Jul 2 07:55:37.033271 lvm[1095]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:55:37.062852 systemd[1]: Finished lvm2-activation-early.service. Jul 2 07:55:37.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.063446 systemd[1]: Reached target cryptsetup.target. Jul 2 07:55:37.065391 systemd[1]: Starting lvm2-activation.service... Jul 2 07:55:37.071701 lvm[1097]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 07:55:37.104228 systemd[1]: Finished lvm2-activation.service. Jul 2 07:55:37.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.104946 systemd[1]: Reached target local-fs-pre.target. Jul 2 07:55:37.108035 systemd[1]: Mounting media-configdrive.mount... Jul 2 07:55:37.108676 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 07:55:37.108776 systemd[1]: Reached target machines.target. Jul 2 07:55:37.111539 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 07:55:37.129549 kernel: ISO 9660 Extensions: RRIP_1991A Jul 2 07:55:37.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.131892 systemd[1]: Mounted media-configdrive.mount. Jul 2 07:55:37.132706 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 07:55:37.133204 systemd[1]: Reached target local-fs.target. Jul 2 07:55:37.136055 systemd[1]: Starting ldconfig.service... Jul 2 07:55:37.137522 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.137785 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:37.139920 systemd[1]: Starting systemd-boot-update.service... Jul 2 07:55:37.150136 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 07:55:37.157737 systemd[1]: Starting systemd-sysext.service... Jul 2 07:55:37.161929 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1107 (bootctl) Jul 2 07:55:37.165153 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 07:55:37.183887 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 07:55:37.195778 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 07:55:37.196139 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 07:55:37.224360 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 07:55:37.225972 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 07:55:37.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.232651 kernel: loop0: detected capacity change from 0 to 209816 Jul 2 07:55:37.260262 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 07:55:37.277378 kernel: loop1: detected capacity change from 0 to 209816 Jul 2 07:55:37.295001 (sd-sysext)[1120]: Using extensions 'kubernetes'. Jul 2 07:55:37.295764 (sd-sysext)[1120]: Merged extensions into '/usr'. Jul 2 07:55:37.308750 systemd-fsck[1114]: fsck.fat 4.2 (2021-01-31) Jul 2 07:55:37.308750 systemd-fsck[1114]: /dev/vda1: 789 files, 119238/258078 clusters Jul 2 07:55:37.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.314337 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 07:55:37.317004 systemd[1]: Mounting boot.mount... Jul 2 07:55:37.338083 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.340901 systemd[1]: Mounting usr-share-oem.mount... Jul 2 07:55:37.342679 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.345828 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:55:37.349122 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:55:37.355330 systemd[1]: Starting modprobe@loop.service... Jul 2 07:55:37.358627 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.358883 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:37.359044 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.360334 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:55:37.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.360628 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:55:37.364059 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:55:37.364271 systemd[1]: Finished modprobe@loop.service. Jul 2 07:55:37.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.365980 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:55:37.366175 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:55:37.372652 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:55:37.372881 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.376345 systemd[1]: Mounted usr-share-oem.mount. Jul 2 07:55:37.380978 systemd[1]: Finished systemd-sysext.service. Jul 2 07:55:37.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.391294 systemd[1]: Mounted boot.mount. Jul 2 07:55:37.395322 systemd[1]: Starting ensure-sysext.service... Jul 2 07:55:37.398206 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 07:55:37.415397 systemd[1]: Reloading. Jul 2 07:55:37.459388 systemd-tmpfiles[1139]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 07:55:37.467367 systemd-tmpfiles[1139]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 07:55:37.476144 systemd-tmpfiles[1139]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 07:55:37.560734 /usr/lib/systemd/system-generators/torcx-generator[1159]: time="2024-07-02T07:55:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:55:37.560774 /usr/lib/systemd/system-generators/torcx-generator[1159]: time="2024-07-02T07:55:37Z" level=info msg="torcx already run" Jul 2 07:55:37.653676 ldconfig[1104]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 07:55:37.753119 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:55:37.753147 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:55:37.780174 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:55:37.878174 systemd[1]: Finished ldconfig.service. Jul 2 07:55:37.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.879133 systemd[1]: Finished systemd-boot-update.service. Jul 2 07:55:37.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.881713 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 07:55:37.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.886920 systemd[1]: Starting audit-rules.service... Jul 2 07:55:37.889313 systemd[1]: Starting clean-ca-certificates.service... Jul 2 07:55:37.892187 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 07:55:37.896086 systemd[1]: Starting systemd-resolved.service... Jul 2 07:55:37.900176 systemd[1]: Starting systemd-timesyncd.service... Jul 2 07:55:37.902956 systemd[1]: Starting systemd-update-utmp.service... Jul 2 07:55:37.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.917025 systemd[1]: Finished clean-ca-certificates.service. Jul 2 07:55:37.918492 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:55:37.921984 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.924505 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.927061 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:55:37.932544 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:55:37.938710 systemd[1]: Starting modprobe@loop.service... Jul 2 07:55:37.939871 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.940230 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:37.942659 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:55:37.942844 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.949016 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:55:37.949343 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:55:37.950790 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:55:37.951103 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:55:37.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.955838 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.956429 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.961560 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 07:55:37.966032 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:55:37.968392 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.968626 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:37.968802 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:55:37.968954 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.972561 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:55:37.972961 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:55:37.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:37.974353 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:55:37.981034 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:37.981620 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.985419 systemd[1]: Starting modprobe@drm.service... Jul 2 07:55:37.991400 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 07:55:37.994944 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 07:55:37.995207 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:37.998000 audit[1221]: SYSTEM_BOOT pid=1221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.001971 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 07:55:38.002749 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 07:55:38.003016 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 07:55:38.013549 systemd[1]: Finished ensure-sysext.service. Jul 2 07:55:38.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.015077 systemd[1]: Finished systemd-update-utmp.service. Jul 2 07:55:38.016505 systemd-networkd[1058]: eth0: Gained IPv6LL Jul 2 07:55:38.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.033325 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 07:55:38.033592 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 07:55:38.034731 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 07:55:38.035021 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 07:55:38.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.035832 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 07:55:38.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.036477 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 07:55:38.050825 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 07:55:38.051130 systemd[1]: Finished modprobe@loop.service. Jul 2 07:55:38.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.051909 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 07:55:38.053297 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 07:55:38.053582 systemd[1]: Finished modprobe@drm.service. Jul 2 07:55:38.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.079153 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 07:55:38.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.082389 systemd[1]: Starting systemd-update-done.service... Jul 2 07:55:38.116777 systemd[1]: Finished systemd-update-done.service. Jul 2 07:55:38.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:38.143000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 07:55:38.143000 audit[1262]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff0f57a280 a2=420 a3=0 items=0 ppid=1216 pid=1262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:38.143000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 07:55:38.145030 augenrules[1262]: No rules Jul 2 07:55:38.144601 systemd-networkd[1058]: eth1: Gained IPv6LL Jul 2 07:55:38.145118 systemd[1]: Finished audit-rules.service. Jul 2 07:55:38.166839 systemd-resolved[1219]: Positive Trust Anchors: Jul 2 07:55:38.167336 systemd-resolved[1219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 07:55:38.167457 systemd-resolved[1219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 07:55:38.168399 systemd[1]: Started systemd-timesyncd.service. Jul 2 07:55:38.168875 systemd[1]: Reached target time-set.target. Jul 2 07:55:38.178681 systemd-resolved[1219]: Using system hostname 'ci-3510.3.5-5-0ac503668a'. Jul 2 07:55:38.182318 systemd[1]: Started systemd-resolved.service. Jul 2 07:55:38.182838 systemd[1]: Reached target network.target. Jul 2 07:55:38.183171 systemd[1]: Reached target network-online.target. Jul 2 07:55:38.183536 systemd[1]: Reached target nss-lookup.target. Jul 2 07:55:38.183862 systemd[1]: Reached target sysinit.target. Jul 2 07:55:38.190891 systemd[1]: Started motdgen.path. Jul 2 07:55:38.191408 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 07:55:38.191989 systemd[1]: Started logrotate.timer. Jul 2 07:55:38.192420 systemd[1]: Started mdadm.timer. Jul 2 07:55:38.192739 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 07:55:38.193068 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 07:55:38.193106 systemd[1]: Reached target paths.target. Jul 2 07:55:38.193401 systemd[1]: Reached target timers.target. Jul 2 07:55:38.194141 systemd[1]: Listening on dbus.socket. Jul 2 07:55:38.196566 systemd[1]: Starting docker.socket... Jul 2 07:55:38.198835 systemd[1]: Listening on sshd.socket. Jul 2 07:55:38.199552 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:38.200398 systemd[1]: Listening on docker.socket. Jul 2 07:55:38.200938 systemd[1]: Reached target sockets.target. Jul 2 07:55:38.201480 systemd[1]: Reached target basic.target. Jul 2 07:55:38.202060 systemd[1]: System is tainted: cgroupsv1 Jul 2 07:55:38.202208 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:55:38.202378 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 07:55:38.204017 systemd[1]: Starting containerd.service... Jul 2 07:55:38.207252 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 07:55:38.210563 systemd[1]: Starting dbus.service... Jul 2 07:55:38.213315 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 07:55:38.215980 systemd[1]: Starting extend-filesystems.service... Jul 2 07:55:38.216737 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 07:55:38.219826 systemd[1]: Starting kubelet.service... Jul 2 07:55:38.239773 jq[1275]: false Jul 2 07:55:38.229329 systemd[1]: Starting motdgen.service... Jul 2 07:55:38.237085 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 07:55:38.242093 systemd[1]: Starting sshd-keygen.service... Jul 2 07:55:38.254125 systemd[1]: Starting systemd-logind.service... Jul 2 07:55:38.254698 systemd-timesyncd[1220]: Contacted time server 148.135.68.31:123 (0.flatcar.pool.ntp.org). Jul 2 07:55:38.254778 systemd-timesyncd[1220]: Initial clock synchronization to Tue 2024-07-02 07:55:38.322260 UTC. Jul 2 07:55:38.256461 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 07:55:38.256640 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 07:55:38.261514 systemd[1]: Starting update-engine.service... Jul 2 07:55:38.265443 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 07:55:38.270864 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 07:55:38.271200 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 07:55:38.279344 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 07:55:38.279736 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 07:55:38.307251 jq[1292]: true Jul 2 07:55:38.346932 extend-filesystems[1276]: Found loop1 Jul 2 07:55:38.354409 extend-filesystems[1276]: Found vda Jul 2 07:55:38.356036 extend-filesystems[1276]: Found vda1 Jul 2 07:55:38.357047 extend-filesystems[1276]: Found vda2 Jul 2 07:55:38.358386 extend-filesystems[1276]: Found vda3 Jul 2 07:55:38.361643 extend-filesystems[1276]: Found usr Jul 2 07:55:38.364224 extend-filesystems[1276]: Found vda4 Jul 2 07:55:38.365764 jq[1302]: true Jul 2 07:55:38.366918 extend-filesystems[1276]: Found vda6 Jul 2 07:55:38.368083 extend-filesystems[1276]: Found vda7 Jul 2 07:55:38.368083 extend-filesystems[1276]: Found vda9 Jul 2 07:55:38.368083 extend-filesystems[1276]: Checking size of /dev/vda9 Jul 2 07:55:38.372146 dbus-daemon[1274]: [system] SELinux support is enabled Jul 2 07:55:38.372673 systemd[1]: Started dbus.service. Jul 2 07:55:38.376440 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 07:55:38.376517 systemd[1]: Reached target system-config.target. Jul 2 07:55:38.376998 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 07:55:38.377019 systemd[1]: Reached target user-config.target. Jul 2 07:55:38.399382 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 07:55:38.399721 systemd[1]: Finished motdgen.service. Jul 2 07:55:38.452020 extend-filesystems[1276]: Resized partition /dev/vda9 Jul 2 07:55:38.471393 extend-filesystems[1328]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 07:55:38.475756 update_engine[1288]: I0702 07:55:38.474689 1288 main.cc:92] Flatcar Update Engine starting Jul 2 07:55:38.480825 systemd[1]: Started update-engine.service. Jul 2 07:55:38.483710 systemd[1]: Started locksmithd.service. Jul 2 07:55:38.484439 update_engine[1288]: I0702 07:55:38.484175 1288 update_check_scheduler.cc:74] Next update check in 5m23s Jul 2 07:55:38.489379 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Jul 2 07:55:38.544393 bash[1333]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:55:38.547571 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 07:55:38.561426 env[1299]: time="2024-07-02T07:55:38.558202556Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 07:55:38.613272 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Jul 2 07:55:38.629432 extend-filesystems[1328]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 07:55:38.629432 extend-filesystems[1328]: old_desc_blocks = 1, new_desc_blocks = 8 Jul 2 07:55:38.629432 extend-filesystems[1328]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Jul 2 07:55:38.632960 extend-filesystems[1276]: Resized filesystem in /dev/vda9 Jul 2 07:55:38.632960 extend-filesystems[1276]: Found vdb Jul 2 07:55:38.633459 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 07:55:38.633826 systemd[1]: Finished extend-filesystems.service. Jul 2 07:55:38.670135 env[1299]: time="2024-07-02T07:55:38.669976586Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 07:55:38.672351 env[1299]: time="2024-07-02T07:55:38.672231745Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:55:38.675682 env[1299]: time="2024-07-02T07:55:38.675597825Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:55:38.675682 env[1299]: time="2024-07-02T07:55:38.675659996Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676161 env[1299]: time="2024-07-02T07:55:38.676117339Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676161 env[1299]: time="2024-07-02T07:55:38.676150895Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676379 env[1299]: time="2024-07-02T07:55:38.676174108Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 07:55:38.676379 env[1299]: time="2024-07-02T07:55:38.676190187Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676379 env[1299]: time="2024-07-02T07:55:38.676322881Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676685 env[1299]: time="2024-07-02T07:55:38.676654920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676969 env[1299]: time="2024-07-02T07:55:38.676937316Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 07:55:38.676969 env[1299]: time="2024-07-02T07:55:38.676966437Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 07:55:38.677077 env[1299]: time="2024-07-02T07:55:38.677043414Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 07:55:38.677077 env[1299]: time="2024-07-02T07:55:38.677062315Z" level=info msg="metadata content store policy set" policy=shared Jul 2 07:55:38.685538 env[1299]: time="2024-07-02T07:55:38.685458724Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 07:55:38.685538 env[1299]: time="2024-07-02T07:55:38.685548762Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 07:55:38.685781 env[1299]: time="2024-07-02T07:55:38.685569664Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 07:55:38.685781 env[1299]: time="2024-07-02T07:55:38.685643701Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685781 env[1299]: time="2024-07-02T07:55:38.685665929Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685781 env[1299]: time="2024-07-02T07:55:38.685758558Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685781 env[1299]: time="2024-07-02T07:55:38.685780002Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685991 env[1299]: time="2024-07-02T07:55:38.685804638Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685991 env[1299]: time="2024-07-02T07:55:38.685826778Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685991 env[1299]: time="2024-07-02T07:55:38.685849059Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685991 env[1299]: time="2024-07-02T07:55:38.685868564Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.685991 env[1299]: time="2024-07-02T07:55:38.685888876Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 07:55:38.686176 env[1299]: time="2024-07-02T07:55:38.686088461Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 07:55:38.686271 env[1299]: time="2024-07-02T07:55:38.686204908Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 07:55:38.686840 env[1299]: time="2024-07-02T07:55:38.686804439Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 07:55:38.686940 env[1299]: time="2024-07-02T07:55:38.686852537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.686940 env[1299]: time="2024-07-02T07:55:38.686873934Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 07:55:38.687035 env[1299]: time="2024-07-02T07:55:38.686943818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687035 env[1299]: time="2024-07-02T07:55:38.686965018Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687035 env[1299]: time="2024-07-02T07:55:38.686984538Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687138 env[1299]: time="2024-07-02T07:55:38.687032777Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687138 env[1299]: time="2024-07-02T07:55:38.687060695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687138 env[1299]: time="2024-07-02T07:55:38.687083278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687138 env[1299]: time="2024-07-02T07:55:38.687102716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687138 env[1299]: time="2024-07-02T07:55:38.687121932Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687348 env[1299]: time="2024-07-02T07:55:38.687144181Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 07:55:38.687398 env[1299]: time="2024-07-02T07:55:38.687373645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687447 env[1299]: time="2024-07-02T07:55:38.687394776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687447 env[1299]: time="2024-07-02T07:55:38.687416278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.687447 env[1299]: time="2024-07-02T07:55:38.687432182Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 07:55:38.687551 env[1299]: time="2024-07-02T07:55:38.687455955Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 07:55:38.687551 env[1299]: time="2024-07-02T07:55:38.687474367Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 07:55:38.687551 env[1299]: time="2024-07-02T07:55:38.687515911Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 07:55:38.687674 env[1299]: time="2024-07-02T07:55:38.687569041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 07:55:38.688067 env[1299]: time="2024-07-02T07:55:38.687970907Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 07:55:38.688067 env[1299]: time="2024-07-02T07:55:38.688066322Z" level=info msg="Connect containerd service" Jul 2 07:55:38.691528 env[1299]: time="2024-07-02T07:55:38.688112513Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 07:55:38.694150 env[1299]: time="2024-07-02T07:55:38.694075375Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:55:38.696556 env[1299]: time="2024-07-02T07:55:38.696476666Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 07:55:38.696724 env[1299]: time="2024-07-02T07:55:38.696583081Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 07:55:38.696856 systemd[1]: Started containerd.service. Jul 2 07:55:38.697547 env[1299]: time="2024-07-02T07:55:38.697505150Z" level=info msg="containerd successfully booted in 0.171102s" Jul 2 07:55:38.697944 env[1299]: time="2024-07-02T07:55:38.697892672Z" level=info msg="Start subscribing containerd event" Jul 2 07:55:38.698037 env[1299]: time="2024-07-02T07:55:38.697972085Z" level=info msg="Start recovering state" Jul 2 07:55:38.698105 env[1299]: time="2024-07-02T07:55:38.698079856Z" level=info msg="Start event monitor" Jul 2 07:55:38.698147 env[1299]: time="2024-07-02T07:55:38.698106944Z" level=info msg="Start snapshots syncer" Jul 2 07:55:38.698147 env[1299]: time="2024-07-02T07:55:38.698124998Z" level=info msg="Start cni network conf syncer for default" Jul 2 07:55:38.698147 env[1299]: time="2024-07-02T07:55:38.698137157Z" level=info msg="Start streaming server" Jul 2 07:55:38.735741 systemd-logind[1286]: Watching system buttons on /dev/input/event1 (Power Button) Jul 2 07:55:38.740477 systemd-logind[1286]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 2 07:55:38.741651 systemd-logind[1286]: New seat seat0. Jul 2 07:55:38.747781 coreos-metadata[1272]: Jul 02 07:55:38.747 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:55:38.749415 systemd[1]: Started systemd-logind.service. Jul 2 07:55:38.764554 coreos-metadata[1272]: Jul 02 07:55:38.764 INFO Fetch successful Jul 2 07:55:38.768373 unknown[1272]: wrote ssh authorized keys file for user: core Jul 2 07:55:38.788340 update-ssh-keys[1344]: Updated "/home/core/.ssh/authorized_keys" Jul 2 07:55:38.789046 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 07:55:39.060267 locksmithd[1332]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 07:55:39.723693 systemd[1]: Started kubelet.service. Jul 2 07:55:39.810398 sshd_keygen[1306]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 07:55:39.849920 systemd[1]: Finished sshd-keygen.service. Jul 2 07:55:39.855011 systemd[1]: Starting issuegen.service... Jul 2 07:55:39.874676 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 07:55:39.874989 systemd[1]: Finished issuegen.service. Jul 2 07:55:39.878142 systemd[1]: Starting systemd-user-sessions.service... Jul 2 07:55:39.893089 systemd[1]: Finished systemd-user-sessions.service. Jul 2 07:55:39.896107 systemd[1]: Started getty@tty1.service. Jul 2 07:55:39.901746 systemd[1]: Started serial-getty@ttyS0.service. Jul 2 07:55:39.903236 systemd[1]: Reached target getty.target. Jul 2 07:55:39.904750 systemd[1]: Reached target multi-user.target. Jul 2 07:55:39.909329 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 07:55:39.925995 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 07:55:39.926414 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 07:55:39.942965 systemd[1]: Startup finished in 6.240s (kernel) + 7.926s (userspace) = 14.166s. Jul 2 07:55:40.727135 kubelet[1355]: E0702 07:55:40.727014 1355 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 07:55:40.730722 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 07:55:40.730994 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 07:55:41.539287 systemd[1]: Created slice system-sshd.slice. Jul 2 07:55:41.541728 systemd[1]: Started sshd@0-64.23.144.187:22-147.75.109.163:37478.service. Jul 2 07:55:41.614999 sshd[1383]: Accepted publickey for core from 147.75.109.163 port 37478 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:41.617784 sshd[1383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:41.632757 systemd[1]: Created slice user-500.slice. Jul 2 07:55:41.634381 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 07:55:41.640358 systemd-logind[1286]: New session 1 of user core. Jul 2 07:55:41.652399 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 07:55:41.658586 systemd[1]: Starting user@500.service... Jul 2 07:55:41.663463 (systemd)[1388]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:41.799816 systemd[1388]: Queued start job for default target default.target. Jul 2 07:55:41.801661 systemd[1388]: Reached target paths.target. Jul 2 07:55:41.801913 systemd[1388]: Reached target sockets.target. Jul 2 07:55:41.802074 systemd[1388]: Reached target timers.target. Jul 2 07:55:41.802181 systemd[1388]: Reached target basic.target. Jul 2 07:55:41.802404 systemd[1388]: Reached target default.target. Jul 2 07:55:41.802574 systemd[1388]: Startup finished in 124ms. Jul 2 07:55:41.802610 systemd[1]: Started user@500.service. Jul 2 07:55:41.804330 systemd[1]: Started session-1.scope. Jul 2 07:55:41.871723 systemd[1]: Started sshd@1-64.23.144.187:22-147.75.109.163:37484.service. Jul 2 07:55:41.931379 sshd[1397]: Accepted publickey for core from 147.75.109.163 port 37484 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:41.933802 sshd[1397]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:41.940285 systemd-logind[1286]: New session 2 of user core. Jul 2 07:55:41.941361 systemd[1]: Started session-2.scope. Jul 2 07:55:42.007998 sshd[1397]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:42.014562 systemd[1]: Started sshd@2-64.23.144.187:22-147.75.109.163:37488.service. Jul 2 07:55:42.015601 systemd[1]: sshd@1-64.23.144.187:22-147.75.109.163:37484.service: Deactivated successfully. Jul 2 07:55:42.017962 systemd-logind[1286]: Session 2 logged out. Waiting for processes to exit. Jul 2 07:55:42.017986 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 07:55:42.019924 systemd-logind[1286]: Removed session 2. Jul 2 07:55:42.077758 sshd[1402]: Accepted publickey for core from 147.75.109.163 port 37488 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:42.080569 sshd[1402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:42.088391 systemd-logind[1286]: New session 3 of user core. Jul 2 07:55:42.089001 systemd[1]: Started session-3.scope. Jul 2 07:55:42.153970 sshd[1402]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:42.159814 systemd[1]: Started sshd@3-64.23.144.187:22-147.75.109.163:37494.service. Jul 2 07:55:42.160909 systemd[1]: sshd@2-64.23.144.187:22-147.75.109.163:37488.service: Deactivated successfully. Jul 2 07:55:42.163353 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 07:55:42.163706 systemd-logind[1286]: Session 3 logged out. Waiting for processes to exit. Jul 2 07:55:42.166459 systemd-logind[1286]: Removed session 3. Jul 2 07:55:42.219774 sshd[1409]: Accepted publickey for core from 147.75.109.163 port 37494 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:42.221888 sshd[1409]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:42.229965 systemd-logind[1286]: New session 4 of user core. Jul 2 07:55:42.230334 systemd[1]: Started session-4.scope. Jul 2 07:55:42.298886 sshd[1409]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:42.304527 systemd[1]: Started sshd@4-64.23.144.187:22-147.75.109.163:37496.service. Jul 2 07:55:42.305509 systemd[1]: sshd@3-64.23.144.187:22-147.75.109.163:37494.service: Deactivated successfully. Jul 2 07:55:42.308090 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 07:55:42.308397 systemd-logind[1286]: Session 4 logged out. Waiting for processes to exit. Jul 2 07:55:42.312871 systemd-logind[1286]: Removed session 4. Jul 2 07:55:42.363502 sshd[1416]: Accepted publickey for core from 147.75.109.163 port 37496 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:42.365752 sshd[1416]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:42.371881 systemd-logind[1286]: New session 5 of user core. Jul 2 07:55:42.372499 systemd[1]: Started session-5.scope. Jul 2 07:55:42.445201 sudo[1422]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 07:55:42.445667 sudo[1422]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:42.454580 dbus-daemon[1274]: н\x95>\x83U: received setenforce notice (enforcing=-243502336) Jul 2 07:55:42.457044 sudo[1422]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:42.462708 sshd[1416]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:42.468077 systemd[1]: Started sshd@5-64.23.144.187:22-147.75.109.163:36116.service. Jul 2 07:55:42.477808 systemd[1]: sshd@4-64.23.144.187:22-147.75.109.163:37496.service: Deactivated successfully. Jul 2 07:55:42.478706 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 07:55:42.480625 systemd-logind[1286]: Session 5 logged out. Waiting for processes to exit. Jul 2 07:55:42.482443 systemd-logind[1286]: Removed session 5. Jul 2 07:55:42.533351 sshd[1424]: Accepted publickey for core from 147.75.109.163 port 36116 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:42.535858 sshd[1424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:42.542984 systemd-logind[1286]: New session 6 of user core. Jul 2 07:55:42.543024 systemd[1]: Started session-6.scope. Jul 2 07:55:42.608055 sudo[1431]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 07:55:42.608411 sudo[1431]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:42.613016 sudo[1431]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:42.621219 sudo[1430]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 07:55:42.622432 sudo[1430]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:42.637585 systemd[1]: Stopping audit-rules.service... Jul 2 07:55:42.638000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:55:42.640159 auditctl[1434]: No rules Jul 2 07:55:42.640535 kernel: kauditd_printk_skb: 149 callbacks suppressed Jul 2 07:55:42.640568 kernel: audit: type=1305 audit(1719906942.638:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 07:55:42.642302 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 07:55:42.642642 systemd[1]: Stopped audit-rules.service. Jul 2 07:55:42.638000 audit[1434]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdccfd11a0 a2=420 a3=0 items=0 ppid=1 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:42.647321 kernel: audit: type=1300 audit(1719906942.638:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdccfd11a0 a2=420 a3=0 items=0 ppid=1 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:42.638000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:55:42.651548 kernel: audit: type=1327 audit(1719906942.638:168): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 07:55:42.651675 kernel: audit: type=1131 audit(1719906942.641:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.650814 systemd[1]: Starting audit-rules.service... Jul 2 07:55:42.681221 augenrules[1452]: No rules Jul 2 07:55:42.682832 systemd[1]: Finished audit-rules.service. Jul 2 07:55:42.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.684664 sudo[1430]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:42.684000 audit[1430]: USER_END pid=1430 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.688765 sshd[1424]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:42.692015 kernel: audit: type=1130 audit(1719906942.682:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.692116 kernel: audit: type=1106 audit(1719906942.684:171): pid=1430 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.697023 systemd[1]: Started sshd@6-64.23.144.187:22-147.75.109.163:36124.service. Jul 2 07:55:42.684000 audit[1430]: CRED_DISP pid=1430 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.705316 kernel: audit: type=1104 audit(1719906942.684:172): pid=1430 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.705426 systemd[1]: sshd@5-64.23.144.187:22-147.75.109.163:36116.service: Deactivated successfully. Jul 2 07:55:42.708834 systemd-logind[1286]: Session 6 logged out. Waiting for processes to exit. Jul 2 07:55:42.708955 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 07:55:42.712107 systemd-logind[1286]: Removed session 6. Jul 2 07:55:42.691000 audit[1424]: USER_END pid=1424 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.721792 kernel: audit: type=1106 audit(1719906942.691:173): pid=1424 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.721883 kernel: audit: type=1104 audit(1719906942.691:174): pid=1424 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.691000 audit[1424]: CRED_DISP pid=1424 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.725743 kernel: audit: type=1130 audit(1719906942.697:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.23.144.187:22-147.75.109.163:36124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.23.144.187:22-147.75.109.163:36124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-64.23.144.187:22-147.75.109.163:36116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.769000 audit[1457]: USER_ACCT pid=1457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.771483 sshd[1457]: Accepted publickey for core from 147.75.109.163 port 36124 ssh2: RSA SHA256:u5gbVVgBoVwlaeoYroSslnQZvGkd0BmVvsfiNtowBx0 Jul 2 07:55:42.772000 audit[1457]: CRED_ACQ pid=1457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.772000 audit[1457]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcbc31e80 a2=3 a3=0 items=0 ppid=1 pid=1457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:42.772000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 07:55:42.774640 sshd[1457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 07:55:42.782399 systemd[1]: Started session-7.scope. Jul 2 07:55:42.782704 systemd-logind[1286]: New session 7 of user core. Jul 2 07:55:42.787000 audit[1457]: USER_START pid=1457 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.790000 audit[1462]: CRED_ACQ pid=1462 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:42.843000 audit[1463]: USER_ACCT pid=1463 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.845354 sudo[1463]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 07:55:42.844000 audit[1463]: CRED_REFR pid=1463 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.846025 sudo[1463]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 07:55:42.847000 audit[1463]: USER_START pid=1463 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.866174 systemd[1]: Starting coreos-metadata.service... Jul 2 07:55:42.918549 coreos-metadata[1467]: Jul 02 07:55:42.918 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Jul 2 07:55:42.931394 coreos-metadata[1467]: Jul 02 07:55:42.931 INFO Fetch successful Jul 2 07:55:42.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:42.952703 systemd[1]: Finished coreos-metadata.service. Jul 2 07:55:43.828478 systemd[1]: Stopped kubelet.service. Jul 2 07:55:43.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:43.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:43.832803 systemd[1]: Starting kubelet.service... Jul 2 07:55:43.870979 systemd[1]: Reloading. Jul 2 07:55:44.016428 /usr/lib/systemd/system-generators/torcx-generator[1532]: time="2024-07-02T07:55:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 07:55:44.016458 /usr/lib/systemd/system-generators/torcx-generator[1532]: time="2024-07-02T07:55:44Z" level=info msg="torcx already run" Jul 2 07:55:44.144941 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 07:55:44.145334 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 07:55:44.183787 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 07:55:44.328515 systemd[1]: Started kubelet.service. Jul 2 07:55:44.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:44.340375 systemd[1]: Stopping kubelet.service... Jul 2 07:55:44.341589 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 07:55:44.341999 systemd[1]: Stopped kubelet.service. Jul 2 07:55:44.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:44.346403 systemd[1]: Starting kubelet.service... Jul 2 07:55:44.479686 systemd[1]: Started kubelet.service. Jul 2 07:55:44.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:44.556845 kubelet[1596]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:44.557335 kubelet[1596]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 07:55:44.557453 kubelet[1596]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 07:55:44.557687 kubelet[1596]: I0702 07:55:44.557624 1596 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 07:55:44.972949 kubelet[1596]: I0702 07:55:44.972383 1596 server.go:467] "Kubelet version" kubeletVersion="v1.28.7" Jul 2 07:55:44.972949 kubelet[1596]: I0702 07:55:44.972431 1596 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 07:55:44.972949 kubelet[1596]: I0702 07:55:44.972684 1596 server.go:895] "Client rotation is on, will bootstrap in background" Jul 2 07:55:45.009316 kubelet[1596]: I0702 07:55:45.008658 1596 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 07:55:45.028111 kubelet[1596]: I0702 07:55:45.028074 1596 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 07:55:45.028822 kubelet[1596]: I0702 07:55:45.028798 1596 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 07:55:45.029170 kubelet[1596]: I0702 07:55:45.029148 1596 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 07:55:45.029378 kubelet[1596]: I0702 07:55:45.029364 1596 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 07:55:45.029471 kubelet[1596]: I0702 07:55:45.029460 1596 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 07:55:45.030491 kubelet[1596]: I0702 07:55:45.030460 1596 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:45.032264 kubelet[1596]: I0702 07:55:45.032220 1596 kubelet.go:393] "Attempting to sync node with API server" Jul 2 07:55:45.032498 kubelet[1596]: I0702 07:55:45.032479 1596 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 07:55:45.032622 kubelet[1596]: I0702 07:55:45.032610 1596 kubelet.go:309] "Adding apiserver pod source" Jul 2 07:55:45.032698 kubelet[1596]: I0702 07:55:45.032677 1596 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 07:55:45.032767 kubelet[1596]: E0702 07:55:45.032748 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:45.032805 kubelet[1596]: E0702 07:55:45.032711 1596 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:45.035121 kubelet[1596]: I0702 07:55:45.035080 1596 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 07:55:45.038607 kubelet[1596]: W0702 07:55:45.038539 1596 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 07:55:45.041097 kubelet[1596]: I0702 07:55:45.041055 1596 server.go:1232] "Started kubelet" Jul 2 07:55:45.042432 kubelet[1596]: I0702 07:55:45.042391 1596 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 07:55:45.043688 kubelet[1596]: I0702 07:55:45.043450 1596 server.go:462] "Adding debug handlers to kubelet server" Jul 2 07:55:45.044867 kubelet[1596]: I0702 07:55:45.044696 1596 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Jul 2 07:55:45.045306 kubelet[1596]: I0702 07:55:45.045061 1596 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 07:55:45.045532 kubelet[1596]: E0702 07:55:45.045516 1596 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Jul 2 07:55:45.045622 kubelet[1596]: E0702 07:55:45.045609 1596 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 07:55:45.045000 audit[1596]: AVC avc: denied { mac_admin } for pid=1596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.045000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:45.045000 audit[1596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba2690 a1=c000bbc030 a2=c000ba2660 a3=25 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:45.045000 audit[1596]: AVC avc: denied { mac_admin } for pid=1596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.045000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:45.045000 audit[1596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009abf00 a1=c000bbc048 a2=c000ba2720 a3=25 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:45.047430 kubelet[1596]: I0702 07:55:45.046756 1596 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 07:55:45.047430 kubelet[1596]: I0702 07:55:45.046804 1596 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 07:55:45.047430 kubelet[1596]: I0702 07:55:45.046914 1596 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 07:55:45.048893 kubelet[1596]: W0702 07:55:45.048853 1596 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:55:45.049083 kubelet[1596]: E0702 07:55:45.049066 1596 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 2 07:55:45.049370 kubelet[1596]: W0702 07:55:45.049349 1596 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "64.23.144.187" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:55:45.049480 kubelet[1596]: E0702 07:55:45.049467 1596 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "64.23.144.187" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 2 07:55:45.050555 kubelet[1596]: E0702 07:55:45.050375 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de564109e55b00", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 40997120, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 40997120, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.054110 kubelet[1596]: E0702 07:55:45.054011 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410a2b7cdb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 45593307, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 45593307, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.066052 kubelet[1596]: E0702 07:55:45.062159 1596 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"64.23.144.187\" not found" Jul 2 07:55:45.066327 kubelet[1596]: I0702 07:55:45.066117 1596 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 07:55:45.066327 kubelet[1596]: I0702 07:55:45.066309 1596 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 07:55:45.066435 kubelet[1596]: I0702 07:55:45.066411 1596 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 07:55:45.067612 kubelet[1596]: W0702 07:55:45.067557 1596 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 07:55:45.067612 kubelet[1596]: E0702 07:55:45.067610 1596 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 2 07:55:45.069204 kubelet[1596]: E0702 07:55:45.069167 1596 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.23.144.187\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 2 07:55:45.108000 audit[1608]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.108000 audit[1608]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb08b5ee0 a2=0 a3=7ffdb08b5ecc items=0 ppid=1596 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:55:45.110000 audit[1614]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.110000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd87480300 a2=0 a3=7ffd874802ec items=0 ppid=1596 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:55:45.135569 kubelet[1596]: I0702 07:55:45.135539 1596 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 07:55:45.135767 kubelet[1596]: I0702 07:55:45.135756 1596 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 07:55:45.135837 kubelet[1596]: I0702 07:55:45.135828 1596 state_mem.go:36] "Initialized new in-memory state store" Jul 2 07:55:45.136601 kubelet[1596]: E0702 07:55:45.136505 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f7763d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.23.144.187 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134453713, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134453713, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.137987 kubelet[1596]: I0702 07:55:45.137955 1596 policy_none.go:49] "None policy: Start" Jul 2 07:55:45.139056 kubelet[1596]: I0702 07:55:45.139033 1596 memory_manager.go:169] "Starting memorymanager" policy="None" Jul 2 07:55:45.139189 kubelet[1596]: I0702 07:55:45.139179 1596 state_mem.go:35] "Initializing new in-memory state store" Jul 2 07:55:45.139833 kubelet[1596]: E0702 07:55:45.139714 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f779e2b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.23.144.187 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134468651, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134468651, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.113000 audit[1616]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.113000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf3a4fa60 a2=0 a3=7ffcf3a4fa4c items=0 ppid=1596 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:45.147412 kubelet[1596]: I0702 07:55:45.147384 1596 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 07:55:45.146000 audit[1596]: AVC avc: denied { mac_admin } for pid=1596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:55:45.146000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 07:55:45.146000 audit[1596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fb54a0 a1=c000fb8318 a2=c000fb5470 a3=25 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.146000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 07:55:45.147854 kubelet[1596]: I0702 07:55:45.147838 1596 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 07:55:45.148205 kubelet[1596]: I0702 07:55:45.148188 1596 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 07:55:45.151940 kubelet[1596]: E0702 07:55:45.151551 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f77ae6e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.23.144.187 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134472814, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134472814, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.155147 kubelet[1596]: E0702 07:55:45.155099 1596 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"64.23.144.187\" not found" Jul 2 07:55:45.157000 audit[1621]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.157000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdfe8faf40 a2=0 a3=7ffdfe8faf2c items=0 ppid=1596 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:45.173476 kubelet[1596]: E0702 07:55:45.173343 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de5641105aee8f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 149365903, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 149365903, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.175268 kubelet[1596]: I0702 07:55:45.175219 1596 kubelet_node_status.go:70] "Attempting to register node" node="64.23.144.187" Jul 2 07:55:45.176708 kubelet[1596]: E0702 07:55:45.176669 1596 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="64.23.144.187" Jul 2 07:55:45.177303 kubelet[1596]: E0702 07:55:45.177178 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f7763d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.23.144.187 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134453713, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 175144630, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f7763d1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.178518 kubelet[1596]: E0702 07:55:45.178423 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f779e2b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.23.144.187 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134468651, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 175151376, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f779e2b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.183805 kubelet[1596]: E0702 07:55:45.183173 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f77ae6e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.23.144.187 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134472814, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 175169185, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f77ae6e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.214000 audit[1626]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.214000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffff27afb20 a2=0 a3=7ffff27afb0c items=0 ppid=1596 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 07:55:45.217130 kubelet[1596]: I0702 07:55:45.217084 1596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 07:55:45.217000 audit[1628]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.217000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffefdbaf80 a2=0 a3=7fffefdbaf6c items=0 ppid=1596 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.217000 audit[1627]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.217000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffce2a1480 a2=0 a3=7fffce2a146c items=0 ppid=1596 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:55:45.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 07:55:45.219601 kubelet[1596]: I0702 07:55:45.219565 1596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 07:55:45.219601 kubelet[1596]: I0702 07:55:45.219600 1596 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 07:55:45.219751 kubelet[1596]: I0702 07:55:45.219625 1596 kubelet.go:2303] "Starting kubelet main sync loop" Jul 2 07:55:45.219794 kubelet[1596]: E0702 07:55:45.219784 1596 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 2 07:55:45.220000 audit[1629]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.220000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcd7d33c90 a2=0 a3=7ffcd7d33c7c items=0 ppid=1596 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:55:45.223000 audit[1630]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.223000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1d8c84d0 a2=0 a3=7fff1d8c84bc items=0 ppid=1596 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 07:55:45.225465 kubelet[1596]: W0702 07:55:45.225437 1596 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 2 07:55:45.225591 kubelet[1596]: E0702 07:55:45.225579 1596 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Jul 2 07:55:45.225000 audit[1632]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:45.225000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3c838210 a2=0 a3=7ffe3c8381fc items=0 ppid=1596 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:55:45.228000 audit[1633]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.228000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe50c313a0 a2=0 a3=7ffe50c3138c items=0 ppid=1596 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 07:55:45.230000 audit[1634]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:45.230000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6051d580 a2=0 a3=7ffc6051d56c items=0 ppid=1596 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:45.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 07:55:45.271644 kubelet[1596]: E0702 07:55:45.271590 1596 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.23.144.187\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Jul 2 07:55:45.378136 kubelet[1596]: I0702 07:55:45.378092 1596 kubelet_node_status.go:70] "Attempting to register node" node="64.23.144.187" Jul 2 07:55:45.380226 kubelet[1596]: E0702 07:55:45.380056 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f7763d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.23.144.187 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134453713, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 378024369, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f7763d1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.380590 kubelet[1596]: E0702 07:55:45.380559 1596 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="64.23.144.187" Jul 2 07:55:45.381634 kubelet[1596]: E0702 07:55:45.381423 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f779e2b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.23.144.187 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134468651, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 378040955, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f779e2b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.387313 kubelet[1596]: E0702 07:55:45.387186 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f77ae6e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.23.144.187 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134472814, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 378045577, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f77ae6e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.674295 kubelet[1596]: E0702 07:55:45.674143 1596 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"64.23.144.187\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Jul 2 07:55:45.782366 kubelet[1596]: I0702 07:55:45.782287 1596 kubelet_node_status.go:70] "Attempting to register node" node="64.23.144.187" Jul 2 07:55:45.785937 kubelet[1596]: E0702 07:55:45.785889 1596 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="64.23.144.187" Jul 2 07:55:45.786154 kubelet[1596]: E0702 07:55:45.786006 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f7763d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 64.23.144.187 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134453713, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 782215954, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f7763d1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.787401 kubelet[1596]: E0702 07:55:45.787315 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f779e2b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 64.23.144.187 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134468651, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 782227015, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f779e2b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.788490 kubelet[1596]: E0702 07:55:45.788386 1596 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187.17de56410f77ae6e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"64.23.144.187", UID:"64.23.144.187", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 64.23.144.187 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"64.23.144.187"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 134472814, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 45, 782230317, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"64.23.144.187"}': 'events "64.23.144.187.17de56410f77ae6e" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Jul 2 07:55:45.974735 kubelet[1596]: I0702 07:55:45.974576 1596 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 2 07:55:46.033451 kubelet[1596]: E0702 07:55:46.033396 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:46.408729 kubelet[1596]: E0702 07:55:46.408558 1596 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "64.23.144.187" not found Jul 2 07:55:46.481324 kubelet[1596]: E0702 07:55:46.481224 1596 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"64.23.144.187\" not found" node="64.23.144.187" Jul 2 07:55:46.588284 kubelet[1596]: I0702 07:55:46.588219 1596 kubelet_node_status.go:70] "Attempting to register node" node="64.23.144.187" Jul 2 07:55:46.599382 kubelet[1596]: I0702 07:55:46.599311 1596 kubelet_node_status.go:73] "Successfully registered node" node="64.23.144.187" Jul 2 07:55:46.647920 kubelet[1596]: I0702 07:55:46.647848 1596 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 2 07:55:46.649227 env[1299]: time="2024-07-02T07:55:46.648991839Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 07:55:46.650355 kubelet[1596]: I0702 07:55:46.650327 1596 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 2 07:55:46.996000 audit[1463]: USER_END pid=1463 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:46.996000 audit[1463]: CRED_DISP pid=1463 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 07:55:46.996595 sudo[1463]: pam_unix(sudo:session): session closed for user root Jul 2 07:55:46.999856 sshd[1457]: pam_unix(sshd:session): session closed for user core Jul 2 07:55:47.001000 audit[1457]: USER_END pid=1457 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.001000 audit[1457]: CRED_DISP pid=1457 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 2 07:55:47.003945 systemd[1]: sshd@6-64.23.144.187:22-147.75.109.163:36124.service: Deactivated successfully. Jul 2 07:55:47.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-64.23.144.187:22-147.75.109.163:36124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 07:55:47.005493 systemd-logind[1286]: Session 7 logged out. Waiting for processes to exit. Jul 2 07:55:47.005607 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 07:55:47.007094 systemd-logind[1286]: Removed session 7. Jul 2 07:55:47.033993 kubelet[1596]: I0702 07:55:47.033897 1596 apiserver.go:52] "Watching apiserver" Jul 2 07:55:47.034586 kubelet[1596]: E0702 07:55:47.034269 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:47.040892 kubelet[1596]: I0702 07:55:47.040827 1596 topology_manager.go:215] "Topology Admit Handler" podUID="6369e433-e320-40b0-b8e9-be7f8478f1ff" podNamespace="calico-system" podName="calico-node-54m7p" Jul 2 07:55:47.041313 kubelet[1596]: I0702 07:55:47.041280 1596 topology_manager.go:215] "Topology Admit Handler" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" podNamespace="calico-system" podName="csi-node-driver-xxfzv" Jul 2 07:55:47.041606 kubelet[1596]: I0702 07:55:47.041482 1596 topology_manager.go:215] "Topology Admit Handler" podUID="6f2ebd5e-f3d2-4701-b470-038ea567a4be" podNamespace="kube-system" podName="kube-proxy-rk4tj" Jul 2 07:55:47.043392 kubelet[1596]: E0702 07:55:47.043366 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:47.067428 kubelet[1596]: I0702 07:55:47.067379 1596 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 07:55:47.084571 kubelet[1596]: I0702 07:55:47.084514 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6f2ebd5e-f3d2-4701-b470-038ea567a4be-xtables-lock\") pod \"kube-proxy-rk4tj\" (UID: \"6f2ebd5e-f3d2-4701-b470-038ea567a4be\") " pod="kube-system/kube-proxy-rk4tj" Jul 2 07:55:47.084571 kubelet[1596]: I0702 07:55:47.084585 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6f2ebd5e-f3d2-4701-b470-038ea567a4be-lib-modules\") pod \"kube-proxy-rk4tj\" (UID: \"6f2ebd5e-f3d2-4701-b470-038ea567a4be\") " pod="kube-system/kube-proxy-rk4tj" Jul 2 07:55:47.084878 kubelet[1596]: I0702 07:55:47.084617 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-xtables-lock\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.084878 kubelet[1596]: I0702 07:55:47.084679 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6369e433-e320-40b0-b8e9-be7f8478f1ff-tigera-ca-bundle\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.084878 kubelet[1596]: I0702 07:55:47.084718 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/782feab8-4b48-4013-86dc-aa5b31a57526-varrun\") pod \"csi-node-driver-xxfzv\" (UID: \"782feab8-4b48-4013-86dc-aa5b31a57526\") " pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:55:47.084878 kubelet[1596]: I0702 07:55:47.084748 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-cni-bin-dir\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.084878 kubelet[1596]: I0702 07:55:47.084778 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-cni-log-dir\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085051 kubelet[1596]: I0702 07:55:47.084811 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/782feab8-4b48-4013-86dc-aa5b31a57526-kubelet-dir\") pod \"csi-node-driver-xxfzv\" (UID: \"782feab8-4b48-4013-86dc-aa5b31a57526\") " pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:55:47.085051 kubelet[1596]: I0702 07:55:47.084842 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/782feab8-4b48-4013-86dc-aa5b31a57526-socket-dir\") pod \"csi-node-driver-xxfzv\" (UID: \"782feab8-4b48-4013-86dc-aa5b31a57526\") " pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:55:47.085051 kubelet[1596]: I0702 07:55:47.084885 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/782feab8-4b48-4013-86dc-aa5b31a57526-registration-dir\") pod \"csi-node-driver-xxfzv\" (UID: \"782feab8-4b48-4013-86dc-aa5b31a57526\") " pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:55:47.085051 kubelet[1596]: I0702 07:55:47.084916 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6369e433-e320-40b0-b8e9-be7f8478f1ff-node-certs\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085051 kubelet[1596]: I0702 07:55:47.084949 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-var-run-calico\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085201 kubelet[1596]: I0702 07:55:47.084978 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-var-lib-calico\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085201 kubelet[1596]: I0702 07:55:47.085025 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6f2ebd5e-f3d2-4701-b470-038ea567a4be-kube-proxy\") pod \"kube-proxy-rk4tj\" (UID: \"6f2ebd5e-f3d2-4701-b470-038ea567a4be\") " pod="kube-system/kube-proxy-rk4tj" Jul 2 07:55:47.085201 kubelet[1596]: I0702 07:55:47.085054 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-cni-net-dir\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085201 kubelet[1596]: I0702 07:55:47.085102 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vdfcq\" (UniqueName: \"kubernetes.io/projected/6369e433-e320-40b0-b8e9-be7f8478f1ff-kube-api-access-vdfcq\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085201 kubelet[1596]: I0702 07:55:47.085138 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zq88h\" (UniqueName: \"kubernetes.io/projected/782feab8-4b48-4013-86dc-aa5b31a57526-kube-api-access-zq88h\") pod \"csi-node-driver-xxfzv\" (UID: \"782feab8-4b48-4013-86dc-aa5b31a57526\") " pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:55:47.085438 kubelet[1596]: I0702 07:55:47.085200 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8rrcw\" (UniqueName: \"kubernetes.io/projected/6f2ebd5e-f3d2-4701-b470-038ea567a4be-kube-api-access-8rrcw\") pod \"kube-proxy-rk4tj\" (UID: \"6f2ebd5e-f3d2-4701-b470-038ea567a4be\") " pod="kube-system/kube-proxy-rk4tj" Jul 2 07:55:47.085438 kubelet[1596]: I0702 07:55:47.085263 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-lib-modules\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085438 kubelet[1596]: I0702 07:55:47.085313 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-policysync\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.085438 kubelet[1596]: I0702 07:55:47.085342 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6369e433-e320-40b0-b8e9-be7f8478f1ff-flexvol-driver-host\") pod \"calico-node-54m7p\" (UID: \"6369e433-e320-40b0-b8e9-be7f8478f1ff\") " pod="calico-system/calico-node-54m7p" Jul 2 07:55:47.197715 kubelet[1596]: E0702 07:55:47.197679 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:47.197916 kubelet[1596]: W0702 07:55:47.197895 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:47.198029 kubelet[1596]: E0702 07:55:47.198015 1596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:47.233621 kubelet[1596]: E0702 07:55:47.233586 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:47.233854 kubelet[1596]: W0702 07:55:47.233830 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:47.233971 kubelet[1596]: E0702 07:55:47.233955 1596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:47.243045 kubelet[1596]: E0702 07:55:47.243014 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:47.243288 kubelet[1596]: W0702 07:55:47.243267 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:47.243377 kubelet[1596]: E0702 07:55:47.243365 1596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:47.252164 kubelet[1596]: E0702 07:55:47.252055 1596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 07:55:47.252164 kubelet[1596]: W0702 07:55:47.252083 1596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 07:55:47.252164 kubelet[1596]: E0702 07:55:47.252115 1596 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 07:55:47.346164 kubelet[1596]: E0702 07:55:47.346109 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:47.347288 env[1299]: time="2024-07-02T07:55:47.347204538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rk4tj,Uid:6f2ebd5e-f3d2-4701-b470-038ea567a4be,Namespace:kube-system,Attempt:0,}" Jul 2 07:55:47.351171 kubelet[1596]: E0702 07:55:47.351125 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:47.353114 env[1299]: time="2024-07-02T07:55:47.352319903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-54m7p,Uid:6369e433-e320-40b0-b8e9-be7f8478f1ff,Namespace:calico-system,Attempt:0,}" Jul 2 07:55:48.035487 kubelet[1596]: E0702 07:55:48.035399 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:49.036550 kubelet[1596]: E0702 07:55:49.036465 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:49.139147 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2665701850.mount: Deactivated successfully. Jul 2 07:55:49.145198 env[1299]: time="2024-07-02T07:55:49.145107993Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.146952 env[1299]: time="2024-07-02T07:55:49.146877010Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.149106 env[1299]: time="2024-07-02T07:55:49.149051053Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.150452 env[1299]: time="2024-07-02T07:55:49.150403077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.154078 env[1299]: time="2024-07-02T07:55:49.154016651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.157264 env[1299]: time="2024-07-02T07:55:49.157168867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.158835 env[1299]: time="2024-07-02T07:55:49.158775750Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.160996 env[1299]: time="2024-07-02T07:55:49.160928201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:49.190016 env[1299]: time="2024-07-02T07:55:49.189889482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:49.190209 env[1299]: time="2024-07-02T07:55:49.190024854Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:49.190209 env[1299]: time="2024-07-02T07:55:49.190068060Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:49.190560 env[1299]: time="2024-07-02T07:55:49.190499793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8 pid=1657 runtime=io.containerd.runc.v2 Jul 2 07:55:49.205191 env[1299]: time="2024-07-02T07:55:49.205069895Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:55:49.205421 env[1299]: time="2024-07-02T07:55:49.205201417Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:55:49.205421 env[1299]: time="2024-07-02T07:55:49.205246242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:55:49.205673 env[1299]: time="2024-07-02T07:55:49.205626907Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f37d0b5b38c0e20684b3926d1bb686e65b7b2fef242e593f5ae7b2a19dc608c pid=1664 runtime=io.containerd.runc.v2 Jul 2 07:55:49.221568 kubelet[1596]: E0702 07:55:49.220361 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:49.315319 env[1299]: time="2024-07-02T07:55:49.315144544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-54m7p,Uid:6369e433-e320-40b0-b8e9-be7f8478f1ff,Namespace:calico-system,Attempt:0,} returns sandbox id \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\"" Jul 2 07:55:49.320226 kubelet[1596]: E0702 07:55:49.320180 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:49.322400 env[1299]: time="2024-07-02T07:55:49.322338301Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 07:55:49.332787 env[1299]: time="2024-07-02T07:55:49.332718632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rk4tj,Uid:6f2ebd5e-f3d2-4701-b470-038ea567a4be,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f37d0b5b38c0e20684b3926d1bb686e65b7b2fef242e593f5ae7b2a19dc608c\"" Jul 2 07:55:49.334270 kubelet[1596]: E0702 07:55:49.334213 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:50.037063 kubelet[1596]: E0702 07:55:50.036973 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:50.680687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2999134438.mount: Deactivated successfully. Jul 2 07:55:50.855690 env[1299]: time="2024-07-02T07:55:50.855629379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:50.856942 env[1299]: time="2024-07-02T07:55:50.856911493Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:50.858747 env[1299]: time="2024-07-02T07:55:50.858713854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:50.860413 env[1299]: time="2024-07-02T07:55:50.860378348Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:50.861877 env[1299]: time="2024-07-02T07:55:50.861806128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 07:55:50.865595 env[1299]: time="2024-07-02T07:55:50.865542506Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\"" Jul 2 07:55:50.868646 env[1299]: time="2024-07-02T07:55:50.868591976Z" level=info msg="CreateContainer within sandbox \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 07:55:50.885021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3673221641.mount: Deactivated successfully. Jul 2 07:55:50.888129 env[1299]: time="2024-07-02T07:55:50.888066532Z" level=info msg="CreateContainer within sandbox \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b02376dec358b9a12fd2768d44a6c9048104f00d2f5b732ba12324c9c1e19dbf\"" Jul 2 07:55:50.889872 env[1299]: time="2024-07-02T07:55:50.889808170Z" level=info msg="StartContainer for \"b02376dec358b9a12fd2768d44a6c9048104f00d2f5b732ba12324c9c1e19dbf\"" Jul 2 07:55:51.013175 env[1299]: time="2024-07-02T07:55:51.012996552Z" level=info msg="StartContainer for \"b02376dec358b9a12fd2768d44a6c9048104f00d2f5b732ba12324c9c1e19dbf\" returns successfully" Jul 2 07:55:51.037568 kubelet[1596]: E0702 07:55:51.037487 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:51.062595 env[1299]: time="2024-07-02T07:55:51.062429704Z" level=info msg="shim disconnected" id=b02376dec358b9a12fd2768d44a6c9048104f00d2f5b732ba12324c9c1e19dbf Jul 2 07:55:51.062972 env[1299]: time="2024-07-02T07:55:51.062935352Z" level=warning msg="cleaning up after shim disconnected" id=b02376dec358b9a12fd2768d44a6c9048104f00d2f5b732ba12324c9c1e19dbf namespace=k8s.io Jul 2 07:55:51.063168 env[1299]: time="2024-07-02T07:55:51.063141322Z" level=info msg="cleaning up dead shim" Jul 2 07:55:51.075504 env[1299]: time="2024-07-02T07:55:51.075442172Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1782 runtime=io.containerd.runc.v2\n" Jul 2 07:55:51.220888 kubelet[1596]: E0702 07:55:51.220534 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:51.245037 kubelet[1596]: E0702 07:55:51.245004 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:52.038029 kubelet[1596]: E0702 07:55:52.037969 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:53.039492 kubelet[1596]: E0702 07:55:53.039418 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:53.220376 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3388761143.mount: Deactivated successfully. Jul 2 07:55:53.223548 kubelet[1596]: E0702 07:55:53.222097 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:54.021653 env[1299]: time="2024-07-02T07:55:54.021568501Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:54.023204 env[1299]: time="2024-07-02T07:55:54.023147486Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:54.025366 env[1299]: time="2024-07-02T07:55:54.024699001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:54.026868 env[1299]: time="2024-07-02T07:55:54.026824268Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c\"" Jul 2 07:55:54.027173 env[1299]: time="2024-07-02T07:55:54.026359306Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:54.028796 env[1299]: time="2024-07-02T07:55:54.028761173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 07:55:54.029887 env[1299]: time="2024-07-02T07:55:54.029836913Z" level=info msg="CreateContainer within sandbox \"2f37d0b5b38c0e20684b3926d1bb686e65b7b2fef242e593f5ae7b2a19dc608c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 07:55:54.041268 kubelet[1596]: E0702 07:55:54.040263 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:54.043748 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1886987704.mount: Deactivated successfully. Jul 2 07:55:54.051773 env[1299]: time="2024-07-02T07:55:54.051682510Z" level=info msg="CreateContainer within sandbox \"2f37d0b5b38c0e20684b3926d1bb686e65b7b2fef242e593f5ae7b2a19dc608c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ddb5554bb2e39bc43499d37c9d1dfb675ffe80a7bf939b1e3c25cc1e5a9ee096\"" Jul 2 07:55:54.052874 env[1299]: time="2024-07-02T07:55:54.052826917Z" level=info msg="StartContainer for \"ddb5554bb2e39bc43499d37c9d1dfb675ffe80a7bf939b1e3c25cc1e5a9ee096\"" Jul 2 07:55:54.153291 env[1299]: time="2024-07-02T07:55:54.145720246Z" level=info msg="StartContainer for \"ddb5554bb2e39bc43499d37c9d1dfb675ffe80a7bf939b1e3c25cc1e5a9ee096\" returns successfully" Jul 2 07:55:54.225000 audit[1857]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.227344 kernel: kauditd_printk_skb: 70 callbacks suppressed Jul 2 07:55:54.227462 kernel: audit: type=1325 audit(1719906954.225:211): table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.225000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8954d640 a2=0 a3=7ffc8954d62c items=0 ppid=1817 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.234300 kernel: audit: type=1300 audit(1719906954.225:211): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8954d640 a2=0 a3=7ffc8954d62c items=0 ppid=1817 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.234475 kernel: audit: type=1325 audit(1719906954.229:212): table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.229000 audit[1858]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.229000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe5731770 a2=0 a3=7fffe573175c items=0 ppid=1817 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:54.246164 kernel: audit: type=1300 audit(1719906954.229:212): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe5731770 a2=0 a3=7fffe573175c items=0 ppid=1817 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.246392 kernel: audit: type=1327 audit(1719906954.229:212): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:54.246449 kernel: audit: type=1325 audit(1719906954.233:213): table=nat:16 family=2 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.233000 audit[1859]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.233000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdabf22690 a2=0 a3=7ffdabf2267c items=0 ppid=1817 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.254278 kernel: audit: type=1300 audit(1719906954.233:213): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdabf22690 a2=0 a3=7ffdabf2267c items=0 ppid=1817 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.254466 kernel: audit: type=1327 audit(1719906954.233:213): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:54.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:54.254642 kubelet[1596]: E0702 07:55:54.253647 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:54.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:54.259112 kernel: audit: type=1327 audit(1719906954.225:211): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 07:55:54.259296 kernel: audit: type=1325 audit(1719906954.237:214): table=filter:17 family=2 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.237000 audit[1860]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.237000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0ca12450 a2=0 a3=7fff0ca1243c items=0 ppid=1817 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:55:54.237000 audit[1861]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.237000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc982cf860 a2=0 a3=7ffc982cf84c items=0 ppid=1817 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 07:55:54.237000 audit[1862]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.237000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1b8ba900 a2=0 a3=7fff1b8ba8ec items=0 ppid=1817 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.237000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 07:55:54.266834 kubelet[1596]: I0702 07:55:54.266771 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-rk4tj" podStartSLOduration=3.574832924 podCreationTimestamp="2024-07-02 07:55:46 +0000 UTC" firstStartedPulling="2024-07-02 07:55:49.335638452 +0000 UTC m=+4.842945768" lastFinishedPulling="2024-07-02 07:55:54.027482051 +0000 UTC m=+9.534789360" observedRunningTime="2024-07-02 07:55:54.266333207 +0000 UTC m=+9.773640550" watchObservedRunningTime="2024-07-02 07:55:54.266676516 +0000 UTC m=+9.773983847" Jul 2 07:55:54.327000 audit[1863]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.327000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe9482a7f0 a2=0 a3=7ffe9482a7dc items=0 ppid=1817 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:55:54.332000 audit[1865]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.332000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa5d7abf0 a2=0 a3=7fffa5d7abdc items=0 ppid=1817 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 07:55:54.338000 audit[1868]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.338000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc85553a70 a2=0 a3=7ffc85553a5c items=0 ppid=1817 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 07:55:54.340000 audit[1869]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.340000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff75621ab0 a2=0 a3=7fff75621a9c items=0 ppid=1817 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:55:54.346000 audit[1871]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.346000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd89a01d20 a2=0 a3=7ffd89a01d0c items=0 ppid=1817 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:55:54.348000 audit[1872]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.348000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccd0771d0 a2=0 a3=7ffccd0771bc items=0 ppid=1817 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:55:54.351000 audit[1874]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.351000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca6dc94e0 a2=0 a3=7ffca6dc94cc items=0 ppid=1817 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:55:54.358000 audit[1877]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.358000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc58d5dad0 a2=0 a3=7ffc58d5dabc items=0 ppid=1817 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 07:55:54.360000 audit[1878]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.360000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb192c150 a2=0 a3=7ffdb192c13c items=0 ppid=1817 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:55:54.365000 audit[1880]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.365000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca6bd6520 a2=0 a3=7ffca6bd650c items=0 ppid=1817 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:55:54.368000 audit[1881]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.368000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0a001370 a2=0 a3=7ffc0a00135c items=0 ppid=1817 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:55:54.372000 audit[1883]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.372000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe70c588a0 a2=0 a3=7ffe70c5888c items=0 ppid=1817 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:54.380000 audit[1886]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.380000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff53ecac60 a2=0 a3=7fff53ecac4c items=0 ppid=1817 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:54.387000 audit[1889]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.387000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccc0a0600 a2=0 a3=7ffccc0a05ec items=0 ppid=1817 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:55:54.389000 audit[1890]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.389000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc6aae4cb0 a2=0 a3=7ffc6aae4c9c items=0 ppid=1817 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:55:54.394000 audit[1892]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.394000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff9bdfbe60 a2=0 a3=7fff9bdfbe4c items=0 ppid=1817 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:54.429000 audit[1897]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.429000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffa73c2230 a2=0 a3=7fffa73c221c items=0 ppid=1817 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:54.431000 audit[1898]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.431000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1d0b4da0 a2=0 a3=7ffe1d0b4d8c items=0 ppid=1817 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:55:54.435000 audit[1900]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 07:55:54.435000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffc5394e40 a2=0 a3=7fffc5394e2c items=0 ppid=1817 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:55:54.453000 audit[1906]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:54.453000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff99c6f230 a2=0 a3=7fff99c6f21c items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:54.487000 audit[1906]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:55:54.487000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7fff99c6f230 a2=0 a3=7fff99c6f21c items=0 ppid=1817 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:54.504000 audit[1914]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.504000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb1f62c40 a2=0 a3=7fffb1f62c2c items=0 ppid=1817 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 07:55:54.509000 audit[1916]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.509000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc17b91ac0 a2=0 a3=7ffc17b91aac items=0 ppid=1817 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 07:55:54.515000 audit[1919]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.515000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd2dd7db50 a2=0 a3=7ffd2dd7db3c items=0 ppid=1817 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 07:55:54.517000 audit[1920]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.517000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6160bc10 a2=0 a3=7ffc6160bbfc items=0 ppid=1817 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 07:55:54.521000 audit[1922]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.521000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc5f4f9a50 a2=0 a3=7ffc5f4f9a3c items=0 ppid=1817 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 07:55:54.523000 audit[1923]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.523000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe677e64c0 a2=0 a3=7ffe677e64ac items=0 ppid=1817 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 07:55:54.527000 audit[1925]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.527000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd6a89a100 a2=0 a3=7ffd6a89a0ec items=0 ppid=1817 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 07:55:54.534000 audit[1928]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.534000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffca934e670 a2=0 a3=7ffca934e65c items=0 ppid=1817 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 07:55:54.536000 audit[1929]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.536000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9eb6be0 a2=0 a3=7ffde9eb6bcc items=0 ppid=1817 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 07:55:54.541000 audit[1931]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.541000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea01cd580 a2=0 a3=7ffea01cd56c items=0 ppid=1817 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 07:55:54.543000 audit[1932]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.543000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc66b1e1e0 a2=0 a3=7ffc66b1e1cc items=0 ppid=1817 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 07:55:54.548000 audit[1934]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.548000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1ebcebe0 a2=0 a3=7ffe1ebcebcc items=0 ppid=1817 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 07:55:54.554000 audit[1937]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.554000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff092d89d0 a2=0 a3=7fff092d89bc items=0 ppid=1817 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 07:55:54.561000 audit[1940]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.561000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd22c7b630 a2=0 a3=7ffd22c7b61c items=0 ppid=1817 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 07:55:54.563000 audit[1941]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.563000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffaa7ff3f0 a2=0 a3=7fffaa7ff3dc items=0 ppid=1817 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 07:55:54.567000 audit[1943]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.567000 audit[1943]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffca14d59e0 a2=0 a3=7ffca14d59cc items=0 ppid=1817 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:54.577000 audit[1946]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.577000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe8624d890 a2=0 a3=7ffe8624d87c items=0 ppid=1817 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 07:55:54.579000 audit[1947]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.579000 audit[1947]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe22ccc540 a2=0 a3=7ffe22ccc52c items=0 ppid=1817 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 07:55:54.583000 audit[1949]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.583000 audit[1949]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc25a8de10 a2=0 a3=7ffc25a8ddfc items=0 ppid=1817 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 07:55:54.585000 audit[1950]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.585000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc659f8f80 a2=0 a3=7ffc659f8f6c items=0 ppid=1817 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 07:55:54.589000 audit[1952]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.589000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff554bdee0 a2=0 a3=7fff554bdecc items=0 ppid=1817 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:54.595000 audit[1955]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 07:55:54.595000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3357f5b0 a2=0 a3=7ffc3357f59c items=0 ppid=1817 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 07:55:54.599000 audit[1957]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:55:54.599000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff958a51e0 a2=0 a3=7fff958a51cc items=0 ppid=1817 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.599000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:54.600000 audit[1957]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 07:55:54.600000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff958a51e0 a2=0 a3=7fff958a51cc items=0 ppid=1817 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:55:54.600000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:55:55.041370 kubelet[1596]: E0702 07:55:55.040647 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:55.221862 kubelet[1596]: E0702 07:55:55.221807 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:55.255542 kubelet[1596]: E0702 07:55:55.255504 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:56.041333 kubelet[1596]: E0702 07:55:56.041268 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:57.041743 kubelet[1596]: E0702 07:55:57.041670 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:57.221777 kubelet[1596]: E0702 07:55:57.221726 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:58.042500 kubelet[1596]: E0702 07:55:58.042426 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:58.806528 env[1299]: time="2024-07-02T07:55:58.806458831Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:58.808107 env[1299]: time="2024-07-02T07:55:58.808049221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:58.809651 env[1299]: time="2024-07-02T07:55:58.809593855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:58.810858 env[1299]: time="2024-07-02T07:55:58.810806853Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:55:58.811415 env[1299]: time="2024-07-02T07:55:58.811381219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 07:55:58.814983 env[1299]: time="2024-07-02T07:55:58.814938339Z" level=info msg="CreateContainer within sandbox \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 07:55:58.839170 env[1299]: time="2024-07-02T07:55:58.839064912Z" level=info msg="CreateContainer within sandbox \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4818958694570445479695e7a8ff82b1e506524e72d07084b7bca015f153f353\"" Jul 2 07:55:58.839978 env[1299]: time="2024-07-02T07:55:58.839936281Z" level=info msg="StartContainer for \"4818958694570445479695e7a8ff82b1e506524e72d07084b7bca015f153f353\"" Jul 2 07:55:58.948283 env[1299]: time="2024-07-02T07:55:58.946848054Z" level=info msg="StartContainer for \"4818958694570445479695e7a8ff82b1e506524e72d07084b7bca015f153f353\" returns successfully" Jul 2 07:55:59.043546 kubelet[1596]: E0702 07:55:59.043468 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:55:59.221437 kubelet[1596]: E0702 07:55:59.221273 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:55:59.271279 kubelet[1596]: E0702 07:55:59.271205 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:55:59.438651 env[1299]: time="2024-07-02T07:55:59.438549174Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 07:55:59.470038 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4818958694570445479695e7a8ff82b1e506524e72d07084b7bca015f153f353-rootfs.mount: Deactivated successfully. Jul 2 07:55:59.479584 env[1299]: time="2024-07-02T07:55:59.479454390Z" level=info msg="shim disconnected" id=4818958694570445479695e7a8ff82b1e506524e72d07084b7bca015f153f353 Jul 2 07:55:59.479943 env[1299]: time="2024-07-02T07:55:59.479912754Z" level=warning msg="cleaning up after shim disconnected" id=4818958694570445479695e7a8ff82b1e506524e72d07084b7bca015f153f353 namespace=k8s.io Jul 2 07:55:59.480072 env[1299]: time="2024-07-02T07:55:59.480054105Z" level=info msg="cleaning up dead shim" Jul 2 07:55:59.491640 env[1299]: time="2024-07-02T07:55:59.491572086Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:59Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2006 runtime=io.containerd.runc.v2\n" Jul 2 07:55:59.502420 kubelet[1596]: I0702 07:55:59.502368 1596 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Jul 2 07:56:00.045109 kubelet[1596]: E0702 07:56:00.045046 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:00.269593 kubelet[1596]: E0702 07:56:00.269548 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:56:00.271820 env[1299]: time="2024-07-02T07:56:00.271758921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 07:56:01.046760 kubelet[1596]: E0702 07:56:01.046674 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:01.224592 env[1299]: time="2024-07-02T07:56:01.224518481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfzv,Uid:782feab8-4b48-4013-86dc-aa5b31a57526,Namespace:calico-system,Attempt:0,}" Jul 2 07:56:01.361395 env[1299]: time="2024-07-02T07:56:01.361178244Z" level=error msg="Failed to destroy network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:01.365880 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62-shm.mount: Deactivated successfully. Jul 2 07:56:01.367777 env[1299]: time="2024-07-02T07:56:01.367695550Z" level=error msg="encountered an error cleaning up failed sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:01.367896 env[1299]: time="2024-07-02T07:56:01.367797222Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfzv,Uid:782feab8-4b48-4013-86dc-aa5b31a57526,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:01.368256 kubelet[1596]: E0702 07:56:01.368191 1596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:01.368428 kubelet[1596]: E0702 07:56:01.368359 1596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:56:01.368428 kubelet[1596]: E0702 07:56:01.368390 1596 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xxfzv" Jul 2 07:56:01.368550 kubelet[1596]: E0702 07:56:01.368479 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xxfzv_calico-system(782feab8-4b48-4013-86dc-aa5b31a57526)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xxfzv_calico-system(782feab8-4b48-4013-86dc-aa5b31a57526)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:56:02.047090 kubelet[1596]: E0702 07:56:02.046979 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:02.286430 kubelet[1596]: I0702 07:56:02.285578 1596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:02.287055 env[1299]: time="2024-07-02T07:56:02.286983812Z" level=info msg="StopPodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\"" Jul 2 07:56:02.349728 env[1299]: time="2024-07-02T07:56:02.349314401Z" level=error msg="StopPodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" failed" error="failed to destroy network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:02.350562 kubelet[1596]: E0702 07:56:02.350259 1596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:02.350562 kubelet[1596]: E0702 07:56:02.350415 1596 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62"} Jul 2 07:56:02.350562 kubelet[1596]: E0702 07:56:02.350462 1596 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"782feab8-4b48-4013-86dc-aa5b31a57526\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:02.350562 kubelet[1596]: E0702 07:56:02.350506 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"782feab8-4b48-4013-86dc-aa5b31a57526\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xxfzv" podUID="782feab8-4b48-4013-86dc-aa5b31a57526" Jul 2 07:56:03.047876 kubelet[1596]: E0702 07:56:03.047769 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:04.048907 kubelet[1596]: E0702 07:56:04.048844 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:04.086168 kubelet[1596]: I0702 07:56:04.086116 1596 topology_manager.go:215] "Topology Admit Handler" podUID="721c742e-4fe2-4e94-9247-4255b56d0964" podNamespace="default" podName="nginx-deployment-6d5f899847-jldqd" Jul 2 07:56:04.109942 kubelet[1596]: I0702 07:56:04.109877 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fnb2d\" (UniqueName: \"kubernetes.io/projected/721c742e-4fe2-4e94-9247-4255b56d0964-kube-api-access-fnb2d\") pod \"nginx-deployment-6d5f899847-jldqd\" (UID: \"721c742e-4fe2-4e94-9247-4255b56d0964\") " pod="default/nginx-deployment-6d5f899847-jldqd" Jul 2 07:56:04.391492 env[1299]: time="2024-07-02T07:56:04.391143279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jldqd,Uid:721c742e-4fe2-4e94-9247-4255b56d0964,Namespace:default,Attempt:0,}" Jul 2 07:56:04.530006 env[1299]: time="2024-07-02T07:56:04.529908399Z" level=error msg="Failed to destroy network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:04.533700 env[1299]: time="2024-07-02T07:56:04.530382670Z" level=error msg="encountered an error cleaning up failed sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:04.533700 env[1299]: time="2024-07-02T07:56:04.530446547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jldqd,Uid:721c742e-4fe2-4e94-9247-4255b56d0964,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:04.532774 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe-shm.mount: Deactivated successfully. Jul 2 07:56:04.534207 kubelet[1596]: E0702 07:56:04.530728 1596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:04.534207 kubelet[1596]: E0702 07:56:04.530791 1596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-jldqd" Jul 2 07:56:04.534207 kubelet[1596]: E0702 07:56:04.530815 1596 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-jldqd" Jul 2 07:56:04.534530 kubelet[1596]: E0702 07:56:04.530867 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-jldqd_default(721c742e-4fe2-4e94-9247-4255b56d0964)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-jldqd_default(721c742e-4fe2-4e94-9247-4255b56d0964)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-jldqd" podUID="721c742e-4fe2-4e94-9247-4255b56d0964" Jul 2 07:56:05.033156 kubelet[1596]: E0702 07:56:05.033082 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:05.050306 kubelet[1596]: E0702 07:56:05.050229 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:05.294753 kubelet[1596]: I0702 07:56:05.293879 1596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:05.295366 env[1299]: time="2024-07-02T07:56:05.295321332Z" level=info msg="StopPodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\"" Jul 2 07:56:05.356668 env[1299]: time="2024-07-02T07:56:05.356566697Z" level=error msg="StopPodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" failed" error="failed to destroy network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 07:56:05.357683 kubelet[1596]: E0702 07:56:05.357389 1596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:05.357683 kubelet[1596]: E0702 07:56:05.357474 1596 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe"} Jul 2 07:56:05.357683 kubelet[1596]: E0702 07:56:05.357554 1596 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"721c742e-4fe2-4e94-9247-4255b56d0964\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 07:56:05.357683 kubelet[1596]: E0702 07:56:05.357630 1596 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"721c742e-4fe2-4e94-9247-4255b56d0964\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-jldqd" podUID="721c742e-4fe2-4e94-9247-4255b56d0964" Jul 2 07:56:06.050588 kubelet[1596]: E0702 07:56:06.050514 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:07.051663 kubelet[1596]: E0702 07:56:07.051607 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:07.336676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2531985429.mount: Deactivated successfully. Jul 2 07:56:07.431561 env[1299]: time="2024-07-02T07:56:07.431414027Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:07.437063 env[1299]: time="2024-07-02T07:56:07.436997012Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:07.441021 env[1299]: time="2024-07-02T07:56:07.440944081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:07.445340 env[1299]: time="2024-07-02T07:56:07.445070446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:07.447749 env[1299]: time="2024-07-02T07:56:07.447455122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 07:56:07.509391 env[1299]: time="2024-07-02T07:56:07.508907692Z" level=info msg="CreateContainer within sandbox \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 07:56:07.573335 env[1299]: time="2024-07-02T07:56:07.573213113Z" level=info msg="CreateContainer within sandbox \"29965b9f9970da53a1ffabfd63244b692183942044b2235dfdbd75de10d483e8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5a2e8963d07fa77aca896cf034b855e250e90f937bf90cd4a4d0018ae9f3ac5f\"" Jul 2 07:56:07.573458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2305281827.mount: Deactivated successfully. Jul 2 07:56:07.580891 env[1299]: time="2024-07-02T07:56:07.579790132Z" level=info msg="StartContainer for \"5a2e8963d07fa77aca896cf034b855e250e90f937bf90cd4a4d0018ae9f3ac5f\"" Jul 2 07:56:07.796793 env[1299]: time="2024-07-02T07:56:07.796604252Z" level=info msg="StartContainer for \"5a2e8963d07fa77aca896cf034b855e250e90f937bf90cd4a4d0018ae9f3ac5f\" returns successfully" Jul 2 07:56:07.935061 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 07:56:07.935356 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 07:56:08.052512 kubelet[1596]: E0702 07:56:08.052232 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:08.304223 kubelet[1596]: E0702 07:56:08.304082 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:56:08.320409 kubelet[1596]: I0702 07:56:08.320299 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-54m7p" podStartSLOduration=4.191417807 podCreationTimestamp="2024-07-02 07:55:46 +0000 UTC" firstStartedPulling="2024-07-02 07:55:49.321431661 +0000 UTC m=+4.828738984" lastFinishedPulling="2024-07-02 07:56:07.450226809 +0000 UTC m=+22.957534134" observedRunningTime="2024-07-02 07:56:08.319837977 +0000 UTC m=+23.827145303" watchObservedRunningTime="2024-07-02 07:56:08.320212957 +0000 UTC m=+23.827520285" Jul 2 07:56:09.053260 kubelet[1596]: E0702 07:56:09.053185 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:09.299000 audit[2226]: AVC avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19079 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.301567 kernel: kauditd_printk_skb: 143 callbacks suppressed Jul 2 07:56:09.301685 kernel: audit: type=1400 audit(1719906969.299:262): avc: denied { write } for pid=2226 comm="tee" name="fd" dev="proc" ino=19079 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.299000 audit[2226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1d1b3a12 a2=241 a3=1b6 items=1 ppid=2201 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.309259 kernel: audit: type=1300 audit(1719906969.299:262): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1d1b3a12 a2=241 a3=1b6 items=1 ppid=2201 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.311196 kubelet[1596]: I0702 07:56:09.311170 1596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:09.312153 kubelet[1596]: E0702 07:56:09.312129 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:56:09.299000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 07:56:09.299000 audit: PATH item=0 name="/dev/fd/63" inode=19071 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.322193 kernel: audit: type=1307 audit(1719906969.299:262): cwd="/etc/service/enabled/cni/log" Jul 2 07:56:09.322344 kernel: audit: type=1302 audit(1719906969.299:262): item=0 name="/dev/fd/63" inode=19071 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.322376 kernel: audit: type=1327 audit(1719906969.299:262): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.299000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.311000 audit[2234]: AVC avc: denied { write } for pid=2234 comm="tee" name="fd" dev="proc" ino=19088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.311000 audit[2234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3ef3ea10 a2=241 a3=1b6 items=1 ppid=2207 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.340713 kernel: audit: type=1400 audit(1719906969.311:263): avc: denied { write } for pid=2234 comm="tee" name="fd" dev="proc" ino=19088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.340859 kernel: audit: type=1300 audit(1719906969.311:263): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3ef3ea10 a2=241 a3=1b6 items=1 ppid=2207 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.311000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 07:56:09.311000 audit: PATH item=0 name="/dev/fd/63" inode=19074 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.351902 kernel: audit: type=1307 audit(1719906969.311:263): cwd="/etc/service/enabled/bird6/log" Jul 2 07:56:09.352062 kernel: audit: type=1302 audit(1719906969.311:263): item=0 name="/dev/fd/63" inode=19074 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.352103 kernel: audit: type=1327 audit(1719906969.311:263): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.311000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.324000 audit[2243]: AVC avc: denied { write } for pid=2243 comm="tee" name="fd" dev="proc" ino=19092 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.324000 audit[2243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0dc05a00 a2=241 a3=1b6 items=1 ppid=2204 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.324000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 07:56:09.324000 audit: PATH item=0 name="/dev/fd/63" inode=19085 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.355000 audit[2249]: AVC avc: denied { write } for pid=2249 comm="tee" name="fd" dev="proc" ino=19978 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.355000 audit[2249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd4c97a10 a2=241 a3=1b6 items=1 ppid=2203 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.355000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 07:56:09.355000 audit: PATH item=0 name="/dev/fd/63" inode=19972 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.355000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.362000 audit[2252]: AVC avc: denied { write } for pid=2252 comm="tee" name="fd" dev="proc" ino=19983 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.362000 audit[2252]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0168ea01 a2=241 a3=1b6 items=1 ppid=2208 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.362000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 07:56:09.362000 audit: PATH item=0 name="/dev/fd/63" inode=19975 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.387000 audit[2255]: AVC avc: denied { write } for pid=2255 comm="tee" name="fd" dev="proc" ino=19112 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.387000 audit[2255]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc59bb1a11 a2=241 a3=1b6 items=1 ppid=2214 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.387000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 07:56:09.387000 audit: PATH item=0 name="/dev/fd/63" inode=19980 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.412000 audit[2272]: AVC avc: denied { write } for pid=2272 comm="tee" name="fd" dev="proc" ino=19116 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 07:56:09.412000 audit[2272]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4d294a10 a2=241 a3=1b6 items=1 ppid=2222 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.412000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 07:56:09.412000 audit: PATH item=0 name="/dev/fd/63" inode=19987 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:09.412000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 07:56:09.626329 kernel: Initializing XFRM netlink socket Jul 2 07:56:09.846924 systemd-networkd[1058]: vxlan.calico: Link UP Jul 2 07:56:09.847734 systemd-networkd[1058]: vxlan.calico: Gained carrier Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.885000 audit: BPF prog-id=10 op=LOAD Jul 2 07:56:09.885000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff46f158d0 a2=70 a3=7f1234ebb000 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.885000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.886000 audit: BPF prog-id=10 op=UNLOAD Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit: BPF prog-id=11 op=LOAD Jul 2 07:56:09.886000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff46f158d0 a2=70 a3=6f items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.886000 audit: BPF prog-id=11 op=UNLOAD Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff46f15880 a2=70 a3=7fff46f158d0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit: BPF prog-id=12 op=LOAD Jul 2 07:56:09.886000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff46f15860 a2=70 a3=7fff46f158d0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.886000 audit: BPF prog-id=12 op=UNLOAD Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff46f15940 a2=70 a3=0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff46f15930 a2=70 a3=0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.886000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.886000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff46f158a0 a2=70 a3=0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.886000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff46f15970 a2=70 a3=1f068b0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff46f15970 a2=70 a3=1f03880 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.887000 audit: BPF prog-id=13 op=LOAD Jul 2 07:56:09.887000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46f15890 a2=70 a3=0 items=0 ppid=2227 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.887000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 07:56:09.893000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.893000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe162f6a10 a2=70 a3=fff80800 items=0 ppid=2227 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.893000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:56:09.893000 audit[2345]: AVC avc: denied { bpf } for pid=2345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 07:56:09.893000 audit[2345]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe162f68e0 a2=70 a3=3 items=0 ppid=2227 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.893000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 07:56:09.900000 audit: BPF prog-id=13 op=UNLOAD Jul 2 07:56:09.900000 audit[989]: SYSCALL arch=c000003e syscall=16 success=no exit=-25 a0=6 a1=541b a2=7fff84cffc3c a3=7fff84d91080 items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:09.900000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 07:56:10.003000 audit[2371]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:10.003000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe3b035210 a2=0 a3=7ffe3b0351fc items=0 ppid=2227 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:10.003000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:10.013000 audit[2369]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:10.013000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffeb0033520 a2=0 a3=7ffeb003350c items=0 ppid=2227 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:10.013000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:10.022000 audit[2370]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:10.022000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc603729b0 a2=0 a3=7ffc6037299c items=0 ppid=2227 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:10.022000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:10.024000 audit[2373]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:10.024000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc59180020 a2=0 a3=7ffc5918000c items=0 ppid=2227 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:10.024000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:10.054456 kubelet[1596]: E0702 07:56:10.054366 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:11.055417 kubelet[1596]: E0702 07:56:11.055354 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:11.745393 systemd-networkd[1058]: vxlan.calico: Gained IPv6LL Jul 2 07:56:12.056612 kubelet[1596]: E0702 07:56:12.056414 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:12.124551 kubelet[1596]: I0702 07:56:12.124488 1596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 07:56:12.126533 kubelet[1596]: E0702 07:56:12.126498 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:56:12.152123 systemd[1]: run-containerd-runc-k8s.io-5a2e8963d07fa77aca896cf034b855e250e90f937bf90cd4a4d0018ae9f3ac5f-runc.N8mU0q.mount: Deactivated successfully. Jul 2 07:56:12.270378 systemd[1]: run-containerd-runc-k8s.io-5a2e8963d07fa77aca896cf034b855e250e90f937bf90cd4a4d0018ae9f3ac5f-runc.4iGDM1.mount: Deactivated successfully. Jul 2 07:56:13.057226 kubelet[1596]: E0702 07:56:13.057153 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:14.059019 kubelet[1596]: E0702 07:56:14.058973 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:15.060298 kubelet[1596]: E0702 07:56:15.060227 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:15.222149 env[1299]: time="2024-07-02T07:56:15.222074486Z" level=info msg="StopPodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\"" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.319 [INFO][2452] k8s.go 608: Cleaning up netns ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.319 [INFO][2452] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" iface="eth0" netns="/var/run/netns/cni-d1459e98-2988-db36-dca6-310326d63b50" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.320 [INFO][2452] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" iface="eth0" netns="/var/run/netns/cni-d1459e98-2988-db36-dca6-310326d63b50" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.320 [INFO][2452] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" iface="eth0" netns="/var/run/netns/cni-d1459e98-2988-db36-dca6-310326d63b50" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.320 [INFO][2452] k8s.go 615: Releasing IP address(es) ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.321 [INFO][2452] utils.go 188: Calico CNI releasing IP address ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.353 [INFO][2459] ipam_plugin.go 411: Releasing address using handleID ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.354 [INFO][2459] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.354 [INFO][2459] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.363 [WARNING][2459] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.363 [INFO][2459] ipam_plugin.go 439: Releasing address using workloadID ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.366 [INFO][2459] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:15.371619 env[1299]: 2024-07-02 07:56:15.367 [INFO][2452] k8s.go 621: Teardown processing complete. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:15.371444 systemd[1]: run-netns-cni\x2dd1459e98\x2d2988\x2ddb36\x2ddca6\x2d310326d63b50.mount: Deactivated successfully. Jul 2 07:56:15.373408 env[1299]: time="2024-07-02T07:56:15.373354033Z" level=info msg="TearDown network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" successfully" Jul 2 07:56:15.373408 env[1299]: time="2024-07-02T07:56:15.373403474Z" level=info msg="StopPodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" returns successfully" Jul 2 07:56:15.374582 env[1299]: time="2024-07-02T07:56:15.374496150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfzv,Uid:782feab8-4b48-4013-86dc-aa5b31a57526,Namespace:calico-system,Attempt:1,}" Jul 2 07:56:15.563331 systemd-networkd[1058]: calidbd42d16749: Link UP Jul 2 07:56:15.565672 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:15.565844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidbd42d16749: link becomes ready Jul 2 07:56:15.566161 systemd-networkd[1058]: calidbd42d16749: Gained carrier Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.438 [INFO][2466] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.144.187-k8s-csi--node--driver--xxfzv-eth0 csi-node-driver- calico-system 782feab8-4b48-4013-86dc-aa5b31a57526 1024 0 2024-07-02 07:55:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.23.144.187 csi-node-driver-xxfzv eth0 default [] [] [kns.calico-system ksa.calico-system.default] calidbd42d16749 [] []}} ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.438 [INFO][2466] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.482 [INFO][2478] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" HandleID="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.497 [INFO][2478] ipam_plugin.go 264: Auto assigning IP ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" HandleID="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ab70), Attrs:map[string]string{"namespace":"calico-system", "node":"64.23.144.187", "pod":"csi-node-driver-xxfzv", "timestamp":"2024-07-02 07:56:15.48232515 +0000 UTC"}, Hostname:"64.23.144.187", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.497 [INFO][2478] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.497 [INFO][2478] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.497 [INFO][2478] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.144.187' Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.500 [INFO][2478] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.506 [INFO][2478] ipam.go 372: Looking up existing affinities for host host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.513 [INFO][2478] ipam.go 489: Trying affinity for 192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.516 [INFO][2478] ipam.go 155: Attempting to load block cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.519 [INFO][2478] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.519 [INFO][2478] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.79.128/26 handle="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.522 [INFO][2478] ipam.go 1685: Creating new handle: k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24 Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.527 [INFO][2478] ipam.go 1203: Writing block in order to claim IPs block=192.168.79.128/26 handle="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.549 [INFO][2478] ipam.go 1216: Successfully claimed IPs: [192.168.79.129/26] block=192.168.79.128/26 handle="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.550 [INFO][2478] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.79.129/26] handle="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" host="64.23.144.187" Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.550 [INFO][2478] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:15.594144 env[1299]: 2024-07-02 07:56:15.550 [INFO][2478] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.79.129/26] IPv6=[] ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" HandleID="k8s-pod-network.296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.595122 env[1299]: 2024-07-02 07:56:15.553 [INFO][2466] k8s.go 386: Populated endpoint ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-csi--node--driver--xxfzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"782feab8-4b48-4013-86dc-aa5b31a57526", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"", Pod:"csi-node-driver-xxfzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidbd42d16749", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:15.595122 env[1299]: 2024-07-02 07:56:15.554 [INFO][2466] k8s.go 387: Calico CNI using IPs: [192.168.79.129/32] ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.595122 env[1299]: 2024-07-02 07:56:15.554 [INFO][2466] dataplane_linux.go 68: Setting the host side veth name to calidbd42d16749 ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.595122 env[1299]: 2024-07-02 07:56:15.566 [INFO][2466] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.595122 env[1299]: 2024-07-02 07:56:15.567 [INFO][2466] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-csi--node--driver--xxfzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"782feab8-4b48-4013-86dc-aa5b31a57526", ResourceVersion:"1024", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24", Pod:"csi-node-driver-xxfzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidbd42d16749", MAC:"36:1f:94:35:6d:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:15.595122 env[1299]: 2024-07-02 07:56:15.590 [INFO][2466] k8s.go 500: Wrote updated endpoint to datastore ContainerID="296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24" Namespace="calico-system" Pod="csi-node-driver-xxfzv" WorkloadEndpoint="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:15.612971 env[1299]: time="2024-07-02T07:56:15.612621599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:15.612971 env[1299]: time="2024-07-02T07:56:15.612700712Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:15.612971 env[1299]: time="2024-07-02T07:56:15.612718110Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:15.619726 env[1299]: time="2024-07-02T07:56:15.613514418Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24 pid=2506 runtime=io.containerd.runc.v2 Jul 2 07:56:15.683803 kernel: kauditd_printk_skb: 116 callbacks suppressed Jul 2 07:56:15.684006 kernel: audit: type=1325 audit(1719906975.679:289): table=filter:69 family=2 entries=34 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:15.679000 audit[2536]: NETFILTER_CFG table=filter:69 family=2 entries=34 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:15.688138 kernel: audit: type=1300 audit(1719906975.679:289): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd815b8f50 a2=0 a3=7ffd815b8f3c items=0 ppid=2227 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.679000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd815b8f50 a2=0 a3=7ffd815b8f3c items=0 ppid=2227 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:15.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:15.695440 kernel: audit: type=1327 audit(1719906975.679:289): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:15.696202 env[1299]: time="2024-07-02T07:56:15.696149172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xxfzv,Uid:782feab8-4b48-4013-86dc-aa5b31a57526,Namespace:calico-system,Attempt:1,} returns sandbox id \"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24\"" Jul 2 07:56:15.699718 env[1299]: time="2024-07-02T07:56:15.699652558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 07:56:16.061518 kubelet[1596]: E0702 07:56:16.060896 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:17.046323 env[1299]: time="2024-07-02T07:56:17.046229385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:17.048742 env[1299]: time="2024-07-02T07:56:17.047858252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:17.049742 env[1299]: time="2024-07-02T07:56:17.049384818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:17.050686 env[1299]: time="2024-07-02T07:56:17.050630423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:17.051405 env[1299]: time="2024-07-02T07:56:17.051284984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 07:56:17.054073 env[1299]: time="2024-07-02T07:56:17.054014145Z" level=info msg="CreateContainer within sandbox \"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 07:56:17.066699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1498715894.mount: Deactivated successfully. Jul 2 07:56:17.069070 kubelet[1596]: E0702 07:56:17.069031 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:17.071035 env[1299]: time="2024-07-02T07:56:17.070976852Z" level=info msg="CreateContainer within sandbox \"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"30c6d570e7c07dd23397c310130bb2e572b40a9f5fa086e80a778859ddba8bfb\"" Jul 2 07:56:17.072229 env[1299]: time="2024-07-02T07:56:17.072185845Z" level=info msg="StartContainer for \"30c6d570e7c07dd23397c310130bb2e572b40a9f5fa086e80a778859ddba8bfb\"" Jul 2 07:56:17.154765 env[1299]: time="2024-07-02T07:56:17.154701362Z" level=info msg="StartContainer for \"30c6d570e7c07dd23397c310130bb2e572b40a9f5fa086e80a778859ddba8bfb\" returns successfully" Jul 2 07:56:17.156775 env[1299]: time="2024-07-02T07:56:17.156728404Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 07:56:17.314144 systemd-networkd[1058]: calidbd42d16749: Gained IPv6LL Jul 2 07:56:18.069589 kubelet[1596]: E0702 07:56:18.069520 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:18.645131 env[1299]: time="2024-07-02T07:56:18.645040951Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:18.647048 env[1299]: time="2024-07-02T07:56:18.646979892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:18.649334 env[1299]: time="2024-07-02T07:56:18.649202057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:18.651199 env[1299]: time="2024-07-02T07:56:18.651144931Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:18.652084 env[1299]: time="2024-07-02T07:56:18.652031173Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 07:56:18.655588 env[1299]: time="2024-07-02T07:56:18.655527983Z" level=info msg="CreateContainer within sandbox \"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 07:56:18.678194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3130975880.mount: Deactivated successfully. Jul 2 07:56:18.683067 env[1299]: time="2024-07-02T07:56:18.682981840Z" level=info msg="CreateContainer within sandbox \"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d765408b45bb502db49d2e73448ba48fff1b61df1eadac61b3eec503281a767b\"" Jul 2 07:56:18.684146 env[1299]: time="2024-07-02T07:56:18.684099837Z" level=info msg="StartContainer for \"d765408b45bb502db49d2e73448ba48fff1b61df1eadac61b3eec503281a767b\"" Jul 2 07:56:18.723073 systemd[1]: run-containerd-runc-k8s.io-d765408b45bb502db49d2e73448ba48fff1b61df1eadac61b3eec503281a767b-runc.iPBFmI.mount: Deactivated successfully. Jul 2 07:56:18.777093 env[1299]: time="2024-07-02T07:56:18.774043017Z" level=info msg="StartContainer for \"d765408b45bb502db49d2e73448ba48fff1b61df1eadac61b3eec503281a767b\" returns successfully" Jul 2 07:56:19.070711 kubelet[1596]: E0702 07:56:19.070553 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:19.178929 kubelet[1596]: I0702 07:56:19.178888 1596 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 07:56:19.179208 kubelet[1596]: I0702 07:56:19.179189 1596 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 07:56:19.220879 env[1299]: time="2024-07-02T07:56:19.220824538Z" level=info msg="StopPodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\"" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.284 [INFO][2628] k8s.go 608: Cleaning up netns ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.284 [INFO][2628] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" iface="eth0" netns="/var/run/netns/cni-4c50cab2-33b5-d6a7-4cf2-de1cf8e324f9" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.284 [INFO][2628] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" iface="eth0" netns="/var/run/netns/cni-4c50cab2-33b5-d6a7-4cf2-de1cf8e324f9" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.284 [INFO][2628] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" iface="eth0" netns="/var/run/netns/cni-4c50cab2-33b5-d6a7-4cf2-de1cf8e324f9" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.285 [INFO][2628] k8s.go 615: Releasing IP address(es) ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.285 [INFO][2628] utils.go 188: Calico CNI releasing IP address ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.310 [INFO][2634] ipam_plugin.go 411: Releasing address using handleID ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.310 [INFO][2634] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.311 [INFO][2634] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.318 [WARNING][2634] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.318 [INFO][2634] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.321 [INFO][2634] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:19.324893 env[1299]: 2024-07-02 07:56:19.323 [INFO][2628] k8s.go 621: Teardown processing complete. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:19.326014 env[1299]: time="2024-07-02T07:56:19.325389665Z" level=info msg="TearDown network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" successfully" Jul 2 07:56:19.326014 env[1299]: time="2024-07-02T07:56:19.325439746Z" level=info msg="StopPodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" returns successfully" Jul 2 07:56:19.327007 env[1299]: time="2024-07-02T07:56:19.326941593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jldqd,Uid:721c742e-4fe2-4e94-9247-4255b56d0964,Namespace:default,Attempt:1,}" Jul 2 07:56:19.360052 kubelet[1596]: I0702 07:56:19.359694 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xxfzv" podStartSLOduration=30.405467613 podCreationTimestamp="2024-07-02 07:55:46 +0000 UTC" firstStartedPulling="2024-07-02 07:56:15.698418315 +0000 UTC m=+31.205725638" lastFinishedPulling="2024-07-02 07:56:18.652567648 +0000 UTC m=+34.159874959" observedRunningTime="2024-07-02 07:56:19.359232942 +0000 UTC m=+34.866540277" watchObservedRunningTime="2024-07-02 07:56:19.359616934 +0000 UTC m=+34.866924265" Jul 2 07:56:19.491758 systemd-networkd[1058]: calidbd676fa7f8: Link UP Jul 2 07:56:19.494672 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:19.494818 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidbd676fa7f8: link becomes ready Jul 2 07:56:19.495073 systemd-networkd[1058]: calidbd676fa7f8: Gained carrier Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.387 [INFO][2640] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0 nginx-deployment-6d5f899847- default 721c742e-4fe2-4e94-9247-4255b56d0964 1048 0 2024-07-02 07:56:04 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.23.144.187 nginx-deployment-6d5f899847-jldqd eth0 default [] [] [kns.default ksa.default.default] calidbd676fa7f8 [] []}} ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.388 [INFO][2640] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.427 [INFO][2652] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" HandleID="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.442 [INFO][2652] ipam_plugin.go 264: Auto assigning IP ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" HandleID="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308500), Attrs:map[string]string{"namespace":"default", "node":"64.23.144.187", "pod":"nginx-deployment-6d5f899847-jldqd", "timestamp":"2024-07-02 07:56:19.427396693 +0000 UTC"}, Hostname:"64.23.144.187", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.442 [INFO][2652] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.442 [INFO][2652] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.442 [INFO][2652] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.144.187' Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.445 [INFO][2652] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.453 [INFO][2652] ipam.go 372: Looking up existing affinities for host host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.459 [INFO][2652] ipam.go 489: Trying affinity for 192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.462 [INFO][2652] ipam.go 155: Attempting to load block cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.466 [INFO][2652] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.466 [INFO][2652] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.79.128/26 handle="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.469 [INFO][2652] ipam.go 1685: Creating new handle: k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438 Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.475 [INFO][2652] ipam.go 1203: Writing block in order to claim IPs block=192.168.79.128/26 handle="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.482 [INFO][2652] ipam.go 1216: Successfully claimed IPs: [192.168.79.130/26] block=192.168.79.128/26 handle="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.482 [INFO][2652] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.79.130/26] handle="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" host="64.23.144.187" Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.482 [INFO][2652] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:19.519302 env[1299]: 2024-07-02 07:56:19.482 [INFO][2652] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.79.130/26] IPv6=[] ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" HandleID="k8s-pod-network.5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.520190 env[1299]: 2024-07-02 07:56:19.484 [INFO][2640] k8s.go 386: Populated endpoint ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"721c742e-4fe2-4e94-9247-4255b56d0964", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"", Pod:"nginx-deployment-6d5f899847-jldqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidbd676fa7f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:19.520190 env[1299]: 2024-07-02 07:56:19.485 [INFO][2640] k8s.go 387: Calico CNI using IPs: [192.168.79.130/32] ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.520190 env[1299]: 2024-07-02 07:56:19.485 [INFO][2640] dataplane_linux.go 68: Setting the host side veth name to calidbd676fa7f8 ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.520190 env[1299]: 2024-07-02 07:56:19.495 [INFO][2640] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.520190 env[1299]: 2024-07-02 07:56:19.497 [INFO][2640] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"721c742e-4fe2-4e94-9247-4255b56d0964", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438", Pod:"nginx-deployment-6d5f899847-jldqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidbd676fa7f8", MAC:"fe:be:0f:34:24:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:19.520190 env[1299]: 2024-07-02 07:56:19.512 [INFO][2640] k8s.go 500: Wrote updated endpoint to datastore ContainerID="5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438" Namespace="default" Pod="nginx-deployment-6d5f899847-jldqd" WorkloadEndpoint="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:19.529000 audit[2669]: NETFILTER_CFG table=filter:70 family=2 entries=38 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:19.529000 audit[2669]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffe6dc05c0 a2=0 a3=7fffe6dc05ac items=0 ppid=2227 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:19.537867 kernel: audit: type=1325 audit(1719906979.529:290): table=filter:70 family=2 entries=38 op=nft_register_chain pid=2669 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:19.538006 kernel: audit: type=1300 audit(1719906979.529:290): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7fffe6dc05c0 a2=0 a3=7fffe6dc05ac items=0 ppid=2227 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:19.538824 env[1299]: time="2024-07-02T07:56:19.538738650Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:19.529000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:19.539336 env[1299]: time="2024-07-02T07:56:19.539024154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:19.539566 env[1299]: time="2024-07-02T07:56:19.539534255Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:19.539879 env[1299]: time="2024-07-02T07:56:19.539847414Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438 pid=2682 runtime=io.containerd.runc.v2 Jul 2 07:56:19.542316 kernel: audit: type=1327 audit(1719906979.529:290): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:19.629792 env[1299]: time="2024-07-02T07:56:19.629745763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-jldqd,Uid:721c742e-4fe2-4e94-9247-4255b56d0964,Namespace:default,Attempt:1,} returns sandbox id \"5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438\"" Jul 2 07:56:19.632175 env[1299]: time="2024-07-02T07:56:19.632039378Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:56:19.676229 systemd[1]: run-netns-cni\x2d4c50cab2\x2d33b5\x2dd6a7\x2d4cf2\x2dde1cf8e324f9.mount: Deactivated successfully. Jul 2 07:56:20.071723 kubelet[1596]: E0702 07:56:20.071566 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:21.025710 systemd-networkd[1058]: calidbd676fa7f8: Gained IPv6LL Jul 2 07:56:21.072288 kubelet[1596]: E0702 07:56:21.072210 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:22.073158 kubelet[1596]: E0702 07:56:22.073086 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:22.450458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1643483945.mount: Deactivated successfully. Jul 2 07:56:23.073429 kubelet[1596]: E0702 07:56:23.073360 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:23.813584 update_engine[1288]: I0702 07:56:23.813402 1288 update_attempter.cc:509] Updating boot flags... Jul 2 07:56:24.074446 kubelet[1596]: E0702 07:56:24.074289 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:24.592860 env[1299]: time="2024-07-02T07:56:24.592746563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.595735 env[1299]: time="2024-07-02T07:56:24.595664341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.598886 env[1299]: time="2024-07-02T07:56:24.598817408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.601359 env[1299]: time="2024-07-02T07:56:24.601304129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:24.602370 env[1299]: time="2024-07-02T07:56:24.602325898Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:56:24.605025 env[1299]: time="2024-07-02T07:56:24.604974316Z" level=info msg="CreateContainer within sandbox \"5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 2 07:56:24.618940 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3311999719.mount: Deactivated successfully. Jul 2 07:56:24.635848 env[1299]: time="2024-07-02T07:56:24.635783278Z" level=info msg="CreateContainer within sandbox \"5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5ebeb2c0a11c931b4ecae604f56b60ee5ddfb7322618e13e13ef6eb4e0cb8851\"" Jul 2 07:56:24.637085 env[1299]: time="2024-07-02T07:56:24.637050497Z" level=info msg="StartContainer for \"5ebeb2c0a11c931b4ecae604f56b60ee5ddfb7322618e13e13ef6eb4e0cb8851\"" Jul 2 07:56:24.729316 env[1299]: time="2024-07-02T07:56:24.729224887Z" level=info msg="StartContainer for \"5ebeb2c0a11c931b4ecae604f56b60ee5ddfb7322618e13e13ef6eb4e0cb8851\" returns successfully" Jul 2 07:56:25.033133 kubelet[1596]: E0702 07:56:25.033071 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:25.074966 kubelet[1596]: E0702 07:56:25.074898 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:25.615643 systemd[1]: run-containerd-runc-k8s.io-5ebeb2c0a11c931b4ecae604f56b60ee5ddfb7322618e13e13ef6eb4e0cb8851-runc.dg7Lbk.mount: Deactivated successfully. Jul 2 07:56:26.075680 kubelet[1596]: E0702 07:56:26.075630 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:27.076653 kubelet[1596]: E0702 07:56:27.076591 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:28.077899 kubelet[1596]: E0702 07:56:28.077829 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:29.079119 kubelet[1596]: E0702 07:56:29.079066 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:30.079957 kubelet[1596]: E0702 07:56:30.079886 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:31.080498 kubelet[1596]: E0702 07:56:31.080436 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:32.081392 kubelet[1596]: E0702 07:56:32.081334 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:32.331000 audit[2816]: NETFILTER_CFG table=filter:71 family=2 entries=20 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.331000 audit[2816]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc36bcb030 a2=0 a3=7ffc36bcb01c items=0 ppid=1817 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.338534 kernel: audit: type=1325 audit(1719906992.331:291): table=filter:71 family=2 entries=20 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.338661 kernel: audit: type=1300 audit(1719906992.331:291): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc36bcb030 a2=0 a3=7ffc36bcb01c items=0 ppid=1817 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.340477 kernel: audit: type=1327 audit(1719906992.331:291): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.340000 audit[2816]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.340000 audit[2816]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc36bcb030 a2=0 a3=0 items=0 ppid=1817 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.348613 kernel: audit: type=1325 audit(1719906992.340:292): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.350175 kernel: audit: type=1300 audit(1719906992.340:292): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc36bcb030 a2=0 a3=0 items=0 ppid=1817 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.350313 kernel: audit: type=1327 audit(1719906992.340:292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.357000 audit[2821]: NETFILTER_CFG table=filter:73 family=2 entries=32 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.357000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff55db7910 a2=0 a3=7fff55db78fc items=0 ppid=1817 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.364432 kernel: audit: type=1325 audit(1719906992.357:293): table=filter:73 family=2 entries=32 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.364588 kernel: audit: type=1300 audit(1719906992.357:293): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff55db7910 a2=0 a3=7fff55db78fc items=0 ppid=1817 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.364619 kernel: audit: type=1327 audit(1719906992.357:293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.357000 audit[2821]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.368586 kernel: audit: type=1325 audit(1719906992.357:294): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:32.357000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff55db7910 a2=0 a3=0 items=0 ppid=1817 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:32.404559 kubelet[1596]: I0702 07:56:32.404516 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-jldqd" podStartSLOduration=23.432902144 podCreationTimestamp="2024-07-02 07:56:04 +0000 UTC" firstStartedPulling="2024-07-02 07:56:19.631284901 +0000 UTC m=+35.138592212" lastFinishedPulling="2024-07-02 07:56:24.602842961 +0000 UTC m=+40.110150270" observedRunningTime="2024-07-02 07:56:25.374491236 +0000 UTC m=+40.881798567" watchObservedRunningTime="2024-07-02 07:56:32.404460202 +0000 UTC m=+47.911767533" Jul 2 07:56:32.405024 kubelet[1596]: I0702 07:56:32.405004 1596 topology_manager.go:215] "Topology Admit Handler" podUID="a6cd39eb-7323-41e2-b934-8ff378cd66e3" podNamespace="default" podName="nfs-server-provisioner-0" Jul 2 07:56:32.409723 kubelet[1596]: I0702 07:56:32.409673 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qxg47\" (UniqueName: \"kubernetes.io/projected/a6cd39eb-7323-41e2-b934-8ff378cd66e3-kube-api-access-qxg47\") pod \"nfs-server-provisioner-0\" (UID: \"a6cd39eb-7323-41e2-b934-8ff378cd66e3\") " pod="default/nfs-server-provisioner-0" Jul 2 07:56:32.410108 kubelet[1596]: I0702 07:56:32.410083 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a6cd39eb-7323-41e2-b934-8ff378cd66e3-data\") pod \"nfs-server-provisioner-0\" (UID: \"a6cd39eb-7323-41e2-b934-8ff378cd66e3\") " pod="default/nfs-server-provisioner-0" Jul 2 07:56:32.710400 env[1299]: time="2024-07-02T07:56:32.709334955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a6cd39eb-7323-41e2-b934-8ff378cd66e3,Namespace:default,Attempt:0,}" Jul 2 07:56:32.899639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:32.899801 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 2 07:56:32.897019 systemd-networkd[1058]: cali60e51b789ff: Link UP Jul 2 07:56:32.899835 systemd-networkd[1058]: cali60e51b789ff: Gained carrier Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.775 [INFO][2823] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.144.187-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a6cd39eb-7323-41e2-b934-8ff378cd66e3 1104 0 2024-07-02 07:56:32 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 64.23.144.187 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.776 [INFO][2823] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.822 [INFO][2835] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" HandleID="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Workload="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.837 [INFO][2835] ipam_plugin.go 264: Auto assigning IP ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" HandleID="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Workload="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f1cc0), Attrs:map[string]string{"namespace":"default", "node":"64.23.144.187", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 07:56:32.822878998 +0000 UTC"}, Hostname:"64.23.144.187", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.837 [INFO][2835] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.837 [INFO][2835] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.837 [INFO][2835] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.144.187' Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.841 [INFO][2835] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.854 [INFO][2835] ipam.go 372: Looking up existing affinities for host host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.863 [INFO][2835] ipam.go 489: Trying affinity for 192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.867 [INFO][2835] ipam.go 155: Attempting to load block cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.872 [INFO][2835] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.872 [INFO][2835] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.79.128/26 handle="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.876 [INFO][2835] ipam.go 1685: Creating new handle: k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.881 [INFO][2835] ipam.go 1203: Writing block in order to claim IPs block=192.168.79.128/26 handle="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.889 [INFO][2835] ipam.go 1216: Successfully claimed IPs: [192.168.79.131/26] block=192.168.79.128/26 handle="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.889 [INFO][2835] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.79.131/26] handle="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" host="64.23.144.187" Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.889 [INFO][2835] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:32.915877 env[1299]: 2024-07-02 07:56:32.889 [INFO][2835] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.79.131/26] IPv6=[] ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" HandleID="k8s-pod-network.a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Workload="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.916869 env[1299]: 2024-07-02 07:56:32.891 [INFO][2823] k8s.go 386: Populated endpoint ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a6cd39eb-7323-41e2-b934-8ff378cd66e3", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.79.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:32.916869 env[1299]: 2024-07-02 07:56:32.892 [INFO][2823] k8s.go 387: Calico CNI using IPs: [192.168.79.131/32] ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.916869 env[1299]: 2024-07-02 07:56:32.892 [INFO][2823] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.916869 env[1299]: 2024-07-02 07:56:32.901 [INFO][2823] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.917112 env[1299]: 2024-07-02 07:56:32.901 [INFO][2823] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a6cd39eb-7323-41e2-b934-8ff378cd66e3", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.79.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"5e:74:dc:a9:ef:53", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:32.917112 env[1299]: 2024-07-02 07:56:32.914 [INFO][2823] k8s.go 500: Wrote updated endpoint to datastore ContainerID="a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="64.23.144.187-k8s-nfs--server--provisioner--0-eth0" Jul 2 07:56:32.938762 env[1299]: time="2024-07-02T07:56:32.938675227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:32.939025 env[1299]: time="2024-07-02T07:56:32.938996042Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:32.939127 env[1299]: time="2024-07-02T07:56:32.939104821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:32.939446 env[1299]: time="2024-07-02T07:56:32.939385563Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a pid=2863 runtime=io.containerd.runc.v2 Jul 2 07:56:32.954000 audit[2877]: NETFILTER_CFG table=filter:75 family=2 entries=44 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:32.954000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffd8adfb370 a2=0 a3=7ffd8adfb35c items=0 ppid=2227 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:32.954000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:33.047806 env[1299]: time="2024-07-02T07:56:33.047731483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a6cd39eb-7323-41e2-b934-8ff378cd66e3,Namespace:default,Attempt:0,} returns sandbox id \"a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a\"" Jul 2 07:56:33.050686 env[1299]: time="2024-07-02T07:56:33.050603931Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 2 07:56:33.083253 kubelet[1596]: E0702 07:56:33.083185 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:34.083512 kubelet[1596]: E0702 07:56:34.083447 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:34.465432 systemd-networkd[1058]: cali60e51b789ff: Gained IPv6LL Jul 2 07:56:35.084551 kubelet[1596]: E0702 07:56:35.084489 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:36.085513 kubelet[1596]: E0702 07:56:36.085440 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:36.962098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2935933165.mount: Deactivated successfully. Jul 2 07:56:37.085976 kubelet[1596]: E0702 07:56:37.085868 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:38.086473 kubelet[1596]: E0702 07:56:38.086407 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:39.087115 kubelet[1596]: E0702 07:56:39.087033 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:39.665305 env[1299]: time="2024-07-02T07:56:39.665199142Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:39.667527 env[1299]: time="2024-07-02T07:56:39.667458949Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:39.670356 env[1299]: time="2024-07-02T07:56:39.670289233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:39.672316 env[1299]: time="2024-07-02T07:56:39.672230847Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:39.673359 env[1299]: time="2024-07-02T07:56:39.673305365Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 2 07:56:39.677730 env[1299]: time="2024-07-02T07:56:39.677628061Z" level=info msg="CreateContainer within sandbox \"a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 2 07:56:39.693349 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3383700620.mount: Deactivated successfully. Jul 2 07:56:39.708744 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2119295784.mount: Deactivated successfully. Jul 2 07:56:39.714539 env[1299]: time="2024-07-02T07:56:39.714474917Z" level=info msg="CreateContainer within sandbox \"a0fde8c654826d8f5dde4ab631ba5711d31d32a034f218032c2d03a9028a0a3a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"90c91cb18360891721c0f75036e1dd850530a0d58659a5363a3412f7e9508917\"" Jul 2 07:56:39.715683 env[1299]: time="2024-07-02T07:56:39.715637982Z" level=info msg="StartContainer for \"90c91cb18360891721c0f75036e1dd850530a0d58659a5363a3412f7e9508917\"" Jul 2 07:56:39.803675 env[1299]: time="2024-07-02T07:56:39.803612055Z" level=info msg="StartContainer for \"90c91cb18360891721c0f75036e1dd850530a0d58659a5363a3412f7e9508917\" returns successfully" Jul 2 07:56:40.087950 kubelet[1596]: E0702 07:56:40.087847 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:40.422034 kubelet[1596]: I0702 07:56:40.421815 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.798042776 podCreationTimestamp="2024-07-02 07:56:32 +0000 UTC" firstStartedPulling="2024-07-02 07:56:33.05016661 +0000 UTC m=+48.557473937" lastFinishedPulling="2024-07-02 07:56:39.673896814 +0000 UTC m=+55.181204126" observedRunningTime="2024-07-02 07:56:40.421647754 +0000 UTC m=+55.928955087" watchObservedRunningTime="2024-07-02 07:56:40.421772965 +0000 UTC m=+55.929080293" Jul 2 07:56:40.439000 audit[2970]: NETFILTER_CFG table=filter:76 family=2 entries=20 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.443178 kernel: kauditd_printk_skb: 5 callbacks suppressed Jul 2 07:56:40.443306 kernel: audit: type=1325 audit(1719907000.439:296): table=filter:76 family=2 entries=20 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.443337 kernel: audit: type=1300 audit(1719907000.439:296): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd509f63c0 a2=0 a3=7ffd509f63ac items=0 ppid=1817 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.439000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd509f63c0 a2=0 a3=7ffd509f63ac items=0 ppid=1817 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:40.448332 kernel: audit: type=1327 audit(1719907000.439:296): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:40.441000 audit[2970]: NETFILTER_CFG table=nat:77 family=2 entries=104 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.450517 kernel: audit: type=1325 audit(1719907000.441:297): table=nat:77 family=2 entries=104 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:40.441000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd509f63c0 a2=0 a3=7ffd509f63ac items=0 ppid=1817 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.455904 kernel: audit: type=1300 audit(1719907000.441:297): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd509f63c0 a2=0 a3=7ffd509f63ac items=0 ppid=1817 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:40.456099 kernel: audit: type=1327 audit(1719907000.441:297): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:40.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:41.088107 kubelet[1596]: E0702 07:56:41.088062 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:42.089811 kubelet[1596]: E0702 07:56:42.089752 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:42.150739 systemd[1]: run-containerd-runc-k8s.io-5a2e8963d07fa77aca896cf034b855e250e90f937bf90cd4a4d0018ae9f3ac5f-runc.m84r8G.mount: Deactivated successfully. Jul 2 07:56:42.235427 kubelet[1596]: E0702 07:56:42.235390 1596 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Jul 2 07:56:43.090945 kubelet[1596]: E0702 07:56:43.090864 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:44.092552 kubelet[1596]: E0702 07:56:44.092490 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:45.033006 kubelet[1596]: E0702 07:56:45.032961 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:45.042000 audit[2998]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:45.042000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd264b6530 a2=0 a3=7ffd264b651c items=0 ppid=1817 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:45.049610 kernel: audit: type=1325 audit(1719907005.042:298): table=filter:78 family=2 entries=9 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:45.049782 kernel: audit: type=1300 audit(1719907005.042:298): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd264b6530 a2=0 a3=7ffd264b651c items=0 ppid=1817 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:45.049814 kernel: audit: type=1327 audit(1719907005.042:298): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:45.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:45.045000 audit[2998]: NETFILTER_CFG table=nat:79 family=2 entries=44 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:45.053488 kernel: audit: type=1325 audit(1719907005.045:299): table=nat:79 family=2 entries=44 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:45.059487 env[1299]: time="2024-07-02T07:56:45.059440827Z" level=info msg="StopPodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\"" Jul 2 07:56:45.045000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd264b6530 a2=0 a3=7ffd264b651c items=0 ppid=1817 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:45.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:45.069000 audit[3004]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:45.069000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff08dbcc80 a2=0 a3=7fff08dbcc6c items=0 ppid=1817 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:45.069000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:45.071000 audit[3004]: NETFILTER_CFG table=nat:81 family=2 entries=44 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:45.071000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7fff08dbcc80 a2=0 a3=7fff08dbcc6c items=0 ppid=1817 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:45.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:45.085214 kubelet[1596]: I0702 07:56:45.085164 1596 topology_manager.go:215] "Topology Admit Handler" podUID="b523d4bc-0e03-4345-9c2b-20adddddebfb" podNamespace="calico-apiserver" podName="calico-apiserver-97d7654fc-75dn4" Jul 2 07:56:45.091865 kubelet[1596]: I0702 07:56:45.091811 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b523d4bc-0e03-4345-9c2b-20adddddebfb-calico-apiserver-certs\") pod \"calico-apiserver-97d7654fc-75dn4\" (UID: \"b523d4bc-0e03-4345-9c2b-20adddddebfb\") " pod="calico-apiserver/calico-apiserver-97d7654fc-75dn4" Jul 2 07:56:45.093429 kubelet[1596]: E0702 07:56:45.092767 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:45.093429 kubelet[1596]: I0702 07:56:45.093409 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bncxb\" (UniqueName: \"kubernetes.io/projected/b523d4bc-0e03-4345-9c2b-20adddddebfb-kube-api-access-bncxb\") pod \"calico-apiserver-97d7654fc-75dn4\" (UID: \"b523d4bc-0e03-4345-9c2b-20adddddebfb\") " pod="calico-apiserver/calico-apiserver-97d7654fc-75dn4" Jul 2 07:56:45.095682 kubelet[1596]: W0702 07:56:45.095645 1596 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:64.23.144.187" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node '64.23.144.187' and this object Jul 2 07:56:45.095682 kubelet[1596]: E0702 07:56:45.095692 1596 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:64.23.144.187" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node '64.23.144.187' and this object Jul 2 07:56:45.095845 kubelet[1596]: W0702 07:56:45.095646 1596 reflector.go:535] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:64.23.144.187" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node '64.23.144.187' and this object Jul 2 07:56:45.095845 kubelet[1596]: E0702 07:56:45.095711 1596 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:64.23.144.187" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node '64.23.144.187' and this object Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.144 [WARNING][3014] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-csi--node--driver--xxfzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"782feab8-4b48-4013-86dc-aa5b31a57526", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24", Pod:"csi-node-driver-xxfzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidbd42d16749", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.144 [INFO][3014] k8s.go 608: Cleaning up netns ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.144 [INFO][3014] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" iface="eth0" netns="" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.144 [INFO][3014] k8s.go 615: Releasing IP address(es) ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.144 [INFO][3014] utils.go 188: Calico CNI releasing IP address ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.171 [INFO][3021] ipam_plugin.go 411: Releasing address using handleID ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.172 [INFO][3021] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.172 [INFO][3021] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.184 [WARNING][3021] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.184 [INFO][3021] ipam_plugin.go 439: Releasing address using workloadID ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.190 [INFO][3021] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:45.193893 env[1299]: 2024-07-02 07:56:45.192 [INFO][3014] k8s.go 621: Teardown processing complete. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.194691 env[1299]: time="2024-07-02T07:56:45.194649837Z" level=info msg="TearDown network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" successfully" Jul 2 07:56:45.195448 env[1299]: time="2024-07-02T07:56:45.195397203Z" level=info msg="StopPodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" returns successfully" Jul 2 07:56:45.196209 env[1299]: time="2024-07-02T07:56:45.196170673Z" level=info msg="RemovePodSandbox for \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\"" Jul 2 07:56:45.196330 env[1299]: time="2024-07-02T07:56:45.196211518Z" level=info msg="Forcibly stopping sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\"" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.249 [WARNING][3040] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-csi--node--driver--xxfzv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"782feab8-4b48-4013-86dc-aa5b31a57526", ResourceVersion:"1049", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"296e95e7b410be392944c04d82fc76b0f6c74a4114d9cd5cb0fb0d61d07afa24", Pod:"csi-node-driver-xxfzv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidbd42d16749", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.250 [INFO][3040] k8s.go 608: Cleaning up netns ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.250 [INFO][3040] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" iface="eth0" netns="" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.250 [INFO][3040] k8s.go 615: Releasing IP address(es) ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.250 [INFO][3040] utils.go 188: Calico CNI releasing IP address ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.293 [INFO][3049] ipam_plugin.go 411: Releasing address using handleID ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.293 [INFO][3049] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.293 [INFO][3049] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.304 [WARNING][3049] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.305 [INFO][3049] ipam_plugin.go 439: Releasing address using workloadID ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" HandleID="k8s-pod-network.694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Workload="64.23.144.187-k8s-csi--node--driver--xxfzv-eth0" Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.311 [INFO][3049] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:45.316169 env[1299]: 2024-07-02 07:56:45.313 [INFO][3040] k8s.go 621: Teardown processing complete. ContainerID="694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62" Jul 2 07:56:45.316169 env[1299]: time="2024-07-02T07:56:45.314497262Z" level=info msg="TearDown network for sandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" successfully" Jul 2 07:56:45.316805 env[1299]: time="2024-07-02T07:56:45.316769665Z" level=info msg="RemovePodSandbox \"694a5896e4eca7e43b414783c3c14e4e750edf77a152a4f7be864d622aba9d62\" returns successfully" Jul 2 07:56:45.317524 env[1299]: time="2024-07-02T07:56:45.317472639Z" level=info msg="StopPodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\"" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.368 [WARNING][3069] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"721c742e-4fe2-4e94-9247-4255b56d0964", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438", Pod:"nginx-deployment-6d5f899847-jldqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidbd676fa7f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.369 [INFO][3069] k8s.go 608: Cleaning up netns ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.369 [INFO][3069] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" iface="eth0" netns="" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.369 [INFO][3069] k8s.go 615: Releasing IP address(es) ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.369 [INFO][3069] utils.go 188: Calico CNI releasing IP address ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.395 [INFO][3076] ipam_plugin.go 411: Releasing address using handleID ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.396 [INFO][3076] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.396 [INFO][3076] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.417 [WARNING][3076] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.417 [INFO][3076] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.421 [INFO][3076] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:45.423810 env[1299]: 2024-07-02 07:56:45.422 [INFO][3069] k8s.go 621: Teardown processing complete. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.424802 env[1299]: time="2024-07-02T07:56:45.424753250Z" level=info msg="TearDown network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" successfully" Jul 2 07:56:45.424906 env[1299]: time="2024-07-02T07:56:45.424890673Z" level=info msg="StopPodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" returns successfully" Jul 2 07:56:45.425658 env[1299]: time="2024-07-02T07:56:45.425627757Z" level=info msg="RemovePodSandbox for \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\"" Jul 2 07:56:45.425757 env[1299]: time="2024-07-02T07:56:45.425677117Z" level=info msg="Forcibly stopping sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\"" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.470 [WARNING][3094] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"721c742e-4fe2-4e94-9247-4255b56d0964", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"5236928c98d225307229d3ba346c195d0c0c3106ce12e7414b3ae664540fd438", Pod:"nginx-deployment-6d5f899847-jldqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calidbd676fa7f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.470 [INFO][3094] k8s.go 608: Cleaning up netns ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.470 [INFO][3094] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" iface="eth0" netns="" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.470 [INFO][3094] k8s.go 615: Releasing IP address(es) ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.470 [INFO][3094] utils.go 188: Calico CNI releasing IP address ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.501 [INFO][3100] ipam_plugin.go 411: Releasing address using handleID ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.501 [INFO][3100] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.501 [INFO][3100] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.509 [WARNING][3100] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.509 [INFO][3100] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" HandleID="k8s-pod-network.a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Workload="64.23.144.187-k8s-nginx--deployment--6d5f899847--jldqd-eth0" Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.512 [INFO][3100] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:45.515461 env[1299]: 2024-07-02 07:56:45.513 [INFO][3094] k8s.go 621: Teardown processing complete. ContainerID="a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe" Jul 2 07:56:45.516153 env[1299]: time="2024-07-02T07:56:45.515509792Z" level=info msg="TearDown network for sandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" successfully" Jul 2 07:56:45.518398 env[1299]: time="2024-07-02T07:56:45.518325281Z" level=info msg="RemovePodSandbox \"a095ac1ccc3a5eae08f979651a79c2927ffd906b231687241ce29d6ff61126fe\" returns successfully" Jul 2 07:56:46.093644 kubelet[1596]: E0702 07:56:46.093582 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:46.196084 kubelet[1596]: E0702 07:56:46.196032 1596 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Jul 2 07:56:46.197221 kubelet[1596]: E0702 07:56:46.197181 1596 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/b523d4bc-0e03-4345-9c2b-20adddddebfb-calico-apiserver-certs podName:b523d4bc-0e03-4345-9c2b-20adddddebfb nodeName:}" failed. No retries permitted until 2024-07-02 07:56:46.696385869 +0000 UTC m=+62.203693191 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/b523d4bc-0e03-4345-9c2b-20adddddebfb-calico-apiserver-certs") pod "calico-apiserver-97d7654fc-75dn4" (UID: "b523d4bc-0e03-4345-9c2b-20adddddebfb") : failed to sync secret cache: timed out waiting for the condition Jul 2 07:56:46.205678 kubelet[1596]: E0702 07:56:46.205620 1596 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:46.205973 kubelet[1596]: E0702 07:56:46.205947 1596 projected.go:198] Error preparing data for projected volume kube-api-access-bncxb for pod calico-apiserver/calico-apiserver-97d7654fc-75dn4: failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:46.206225 kubelet[1596]: E0702 07:56:46.206201 1596 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/b523d4bc-0e03-4345-9c2b-20adddddebfb-kube-api-access-bncxb podName:b523d4bc-0e03-4345-9c2b-20adddddebfb nodeName:}" failed. No retries permitted until 2024-07-02 07:56:46.706170947 +0000 UTC m=+62.213478277 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-bncxb" (UniqueName: "kubernetes.io/projected/b523d4bc-0e03-4345-9c2b-20adddddebfb-kube-api-access-bncxb") pod "calico-apiserver-97d7654fc-75dn4" (UID: "b523d4bc-0e03-4345-9c2b-20adddddebfb") : failed to sync configmap cache: timed out waiting for the condition Jul 2 07:56:46.890927 env[1299]: time="2024-07-02T07:56:46.890851455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-97d7654fc-75dn4,Uid:b523d4bc-0e03-4345-9c2b-20adddddebfb,Namespace:calico-apiserver,Attempt:0,}" Jul 2 07:56:47.061937 systemd-networkd[1058]: cali526459df74e: Link UP Jul 2 07:56:47.066319 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:56:47.066468 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali526459df74e: link becomes ready Jul 2 07:56:47.065749 systemd-networkd[1058]: cali526459df74e: Gained carrier Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:46.956 [INFO][3109] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0 calico-apiserver-97d7654fc- calico-apiserver b523d4bc-0e03-4345-9c2b-20adddddebfb 1198 0 2024-07-02 07:56:45 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:97d7654fc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 64.23.144.187 calico-apiserver-97d7654fc-75dn4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali526459df74e [] []}} ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:46.956 [INFO][3109] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:46.996 [INFO][3122] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" HandleID="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Workload="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.014 [INFO][3122] ipam_plugin.go 264: Auto assigning IP ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" HandleID="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Workload="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002efca0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"64.23.144.187", "pod":"calico-apiserver-97d7654fc-75dn4", "timestamp":"2024-07-02 07:56:46.996748989 +0000 UTC"}, Hostname:"64.23.144.187", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.014 [INFO][3122] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.014 [INFO][3122] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.014 [INFO][3122] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.144.187' Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.017 [INFO][3122] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.022 [INFO][3122] ipam.go 372: Looking up existing affinities for host host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.029 [INFO][3122] ipam.go 489: Trying affinity for 192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.032 [INFO][3122] ipam.go 155: Attempting to load block cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.036 [INFO][3122] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.036 [INFO][3122] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.79.128/26 handle="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.039 [INFO][3122] ipam.go 1685: Creating new handle: k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5 Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.045 [INFO][3122] ipam.go 1203: Writing block in order to claim IPs block=192.168.79.128/26 handle="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.052 [INFO][3122] ipam.go 1216: Successfully claimed IPs: [192.168.79.132/26] block=192.168.79.128/26 handle="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.053 [INFO][3122] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.79.132/26] handle="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" host="64.23.144.187" Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.053 [INFO][3122] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:56:47.077476 env[1299]: 2024-07-02 07:56:47.053 [INFO][3122] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.79.132/26] IPv6=[] ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" HandleID="k8s-pod-network.03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Workload="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.078351 env[1299]: 2024-07-02 07:56:47.054 [INFO][3109] k8s.go 386: Populated endpoint ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0", GenerateName:"calico-apiserver-97d7654fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"b523d4bc-0e03-4345-9c2b-20adddddebfb", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"97d7654fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"", Pod:"calico-apiserver-97d7654fc-75dn4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.79.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali526459df74e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:47.078351 env[1299]: 2024-07-02 07:56:47.055 [INFO][3109] k8s.go 387: Calico CNI using IPs: [192.168.79.132/32] ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.078351 env[1299]: 2024-07-02 07:56:47.055 [INFO][3109] dataplane_linux.go 68: Setting the host side veth name to cali526459df74e ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.078351 env[1299]: 2024-07-02 07:56:47.067 [INFO][3109] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.078351 env[1299]: 2024-07-02 07:56:47.067 [INFO][3109] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0", GenerateName:"calico-apiserver-97d7654fc-", Namespace:"calico-apiserver", SelfLink:"", UID:"b523d4bc-0e03-4345-9c2b-20adddddebfb", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"97d7654fc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5", Pod:"calico-apiserver-97d7654fc-75dn4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.79.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali526459df74e", MAC:"de:dc:82:ff:87:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:56:47.078351 env[1299]: 2024-07-02 07:56:47.075 [INFO][3109] k8s.go 500: Wrote updated endpoint to datastore ContainerID="03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5" Namespace="calico-apiserver" Pod="calico-apiserver-97d7654fc-75dn4" WorkloadEndpoint="64.23.144.187-k8s-calico--apiserver--97d7654fc--75dn4-eth0" Jul 2 07:56:47.095528 kubelet[1596]: E0702 07:56:47.095418 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:47.095000 audit[3144]: NETFILTER_CFG table=filter:82 family=2 entries=47 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:47.098506 kernel: kauditd_printk_skb: 8 callbacks suppressed Jul 2 07:56:47.098565 kernel: audit: type=1325 audit(1719907007.095:302): table=filter:82 family=2 entries=47 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:56:47.095000 audit[3144]: SYSCALL arch=c000003e syscall=46 success=yes exit=25072 a0=3 a1=7ffee14e4720 a2=0 a3=7ffee14e470c items=0 ppid=2227 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:47.104308 kernel: audit: type=1300 audit(1719907007.095:302): arch=c000003e syscall=46 success=yes exit=25072 a0=3 a1=7ffee14e4720 a2=0 a3=7ffee14e470c items=0 ppid=2227 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:47.104464 kernel: audit: type=1327 audit(1719907007.095:302): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:47.095000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:56:47.106585 env[1299]: time="2024-07-02T07:56:47.106196961Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:56:47.106585 env[1299]: time="2024-07-02T07:56:47.106254637Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:56:47.106585 env[1299]: time="2024-07-02T07:56:47.106264796Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:56:47.106585 env[1299]: time="2024-07-02T07:56:47.106539047Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5 pid=3151 runtime=io.containerd.runc.v2 Jul 2 07:56:47.179792 env[1299]: time="2024-07-02T07:56:47.179734335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-97d7654fc-75dn4,Uid:b523d4bc-0e03-4345-9c2b-20adddddebfb,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5\"" Jul 2 07:56:47.181853 env[1299]: time="2024-07-02T07:56:47.181814523Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 07:56:48.096009 kubelet[1596]: E0702 07:56:48.095936 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:48.545651 systemd-networkd[1058]: cali526459df74e: Gained IPv6LL Jul 2 07:56:49.096363 kubelet[1596]: E0702 07:56:49.096315 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:49.707866 kubelet[1596]: I0702 07:56:49.707328 1596 topology_manager.go:215] "Topology Admit Handler" podUID="709e30e4-45b2-4e29-aef6-6487be1c64e6" podNamespace="default" podName="test-pod-1" Jul 2 07:56:49.825217 kubelet[1596]: I0702 07:56:49.825168 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-978ae7d4-c83b-4ab3-8789-40b3498c449d\" (UniqueName: \"kubernetes.io/nfs/709e30e4-45b2-4e29-aef6-6487be1c64e6-pvc-978ae7d4-c83b-4ab3-8789-40b3498c449d\") pod \"test-pod-1\" (UID: \"709e30e4-45b2-4e29-aef6-6487be1c64e6\") " pod="default/test-pod-1" Jul 2 07:56:49.825605 kubelet[1596]: I0702 07:56:49.825577 1596 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jd6f8\" (UniqueName: \"kubernetes.io/projected/709e30e4-45b2-4e29-aef6-6487be1c64e6-kube-api-access-jd6f8\") pod \"test-pod-1\" (UID: \"709e30e4-45b2-4e29-aef6-6487be1c64e6\") " pod="default/test-pod-1" Jul 2 07:56:49.968000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.976119 kernel: Failed to create system directory netfs Jul 2 07:56:49.976349 kernel: audit: type=1400 audit(1719907009.968:303): avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.976405 kernel: Failed to create system directory netfs Jul 2 07:56:49.976433 kernel: audit: type=1400 audit(1719907009.968:303): avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.968000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.979922 kernel: Failed to create system directory netfs Jul 2 07:56:49.980110 kernel: audit: type=1400 audit(1719907009.968:303): avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.968000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.983947 kernel: Failed to create system directory netfs Jul 2 07:56:49.984147 kernel: audit: type=1400 audit(1719907009.968:303): avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.968000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.968000 audit[3187]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623615ae5e0 a1=153bc a2=5623605ca2b0 a3=5 items=0 ppid=462 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:49.968000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:56:50.000523 kernel: audit: type=1300 audit(1719907009.968:303): arch=c000003e syscall=175 success=yes exit=0 a0=5623615ae5e0 a1=153bc a2=5623605ca2b0 a3=5 items=0 ppid=462 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.000714 kernel: audit: type=1327 audit(1719907009.968:303): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:56:50.002999 kernel: Failed to create system directory fscache Jul 2 07:56:50.003168 kernel: Failed to create system directory fscache Jul 2 07:56:50.013704 kernel: Failed to create system directory fscache Jul 2 07:56:50.013907 kernel: Failed to create system directory fscache Jul 2 07:56:50.013950 kernel: audit: type=1400 audit(1719907009.992:304): avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.017788 kernel: Failed to create system directory fscache Jul 2 07:56:50.028390 kernel: Failed to create system directory fscache Jul 2 07:56:50.034017 kernel: Failed to create system directory fscache Jul 2 07:56:50.034190 kernel: Failed to create system directory fscache Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.037264 kernel: Failed to create system directory fscache Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.038260 kernel: Failed to create system directory fscache Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.041821 kernel: Failed to create system directory fscache Jul 2 07:56:50.041960 kernel: Failed to create system directory fscache Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.043333 kernel: Failed to create system directory fscache Jul 2 07:56:49.992000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.044278 kernel: Failed to create system directory fscache Jul 2 07:56:49.992000 audit[3187]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623617c39c0 a1=4c0fc a2=5623605ca2b0 a3=5 items=0 ppid=462 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.046537 kernel: FS-Cache: Loaded Jul 2 07:56:49.992000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:56:50.100882 kubelet[1596]: E0702 07:56:50.100809 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.105256 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.105300 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.106777 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.106835 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.107851 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.109045 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.111293 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.111362 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.112299 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.113742 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.113806 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.114764 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.115709 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.116772 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.117623 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.118717 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.119832 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.120848 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.121812 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.122654 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.123471 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.124435 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.125367 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.126354 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.127540 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.128521 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.133328 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.133370 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.134889 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.134982 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.135834 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.136650 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.137433 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.138333 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.139308 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.140732 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.140783 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.141708 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.142475 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.143307 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.144857 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.144919 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.145801 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.146622 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.147424 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.148428 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.149459 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.150476 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.151462 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.152333 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.153302 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.154270 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.155726 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.155770 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.156488 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.157380 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.158423 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.159409 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.160332 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.162301 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.162354 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.163285 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.164676 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.164730 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.165456 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.166271 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.167763 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.167816 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.168556 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.169362 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.170930 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.170981 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.171840 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.172908 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.174012 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.176177 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.176258 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.178516 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.178601 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.179834 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.181060 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.183457 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.183552 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.183661 env[1299]: time="2024-07-02T07:56:50.182589778Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.185080 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.185277 env[1299]: time="2024-07-02T07:56:50.184301810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.186485 env[1299]: time="2024-07-02T07:56:50.186199055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.187856 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.187962 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.188080 env[1299]: time="2024-07-02T07:56:50.187834158Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:56:50.189995 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.190313 env[1299]: time="2024-07-02T07:56:50.188553073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.192707 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.192881 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.194043 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.194362 env[1299]: time="2024-07-02T07:56:50.193893770Z" level=info msg="CreateContainer within sandbox \"03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.196818 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.196944 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.198229 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.204118 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.205146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2635599369.mount: Deactivated successfully. Jul 2 07:56:50.212865 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.213060 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.213091 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.216123 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.216304 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.216340 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.217966 env[1299]: time="2024-07-02T07:56:50.217904276Z" level=info msg="CreateContainer within sandbox \"03a1fac0a31fae040d86e884c0a592ad51ff8aa03cc84725153b604399c711c5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a6eed5796fff87e43b9015a3cc281f7370221774e89aeaedbd849b762c5282e5\"" Jul 2 07:56:50.218172 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.219303 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.219382 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.219670 env[1299]: time="2024-07-02T07:56:50.219624343Z" level=info msg="StartContainer for \"a6eed5796fff87e43b9015a3cc281f7370221774e89aeaedbd849b762c5282e5\"" Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.221214 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.221314 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.223163 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.223260 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.224992 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.225063 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.226675 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.226731 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.233868 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.233938 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.235726 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.235779 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.236544 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.237443 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.245139 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.246652 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.246710 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.247846 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.248983 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.249908 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.250657 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.251430 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.086000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.252311 kernel: Failed to create system directory sunrpc Jul 2 07:56:50.276080 kernel: RPC: Registered named UNIX socket transport module. Jul 2 07:56:50.276189 kernel: RPC: Registered udp transport module. Jul 2 07:56:50.276225 kernel: RPC: Registered tcp transport module. Jul 2 07:56:50.279627 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 2 07:56:50.086000 audit[3187]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56236180fad0 a1=1a7f5c a2=5623605ca2b0 a3=5 items=6 ppid=462 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.086000 audit: CWD cwd="/" Jul 2 07:56:50.086000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:50.086000 audit: PATH item=1 name=(null) inode=23363 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:50.086000 audit: PATH item=2 name=(null) inode=23363 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:50.086000 audit: PATH item=3 name=(null) inode=23364 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:50.086000 audit: PATH item=4 name=(null) inode=23363 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:50.086000 audit: PATH item=5 name=(null) inode=23365 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 07:56:50.086000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:56:50.356648 kernel: Failed to create system directory nfs Jul 2 07:56:50.356807 kernel: Failed to create system directory nfs Jul 2 07:56:50.356829 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.358185 kernel: Failed to create system directory nfs Jul 2 07:56:50.358335 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.359008 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.362275 kernel: Failed to create system directory nfs Jul 2 07:56:50.362384 kernel: Failed to create system directory nfs Jul 2 07:56:50.362423 kernel: Failed to create system directory nfs Jul 2 07:56:50.362441 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.366872 kernel: Failed to create system directory nfs Jul 2 07:56:50.366990 kernel: Failed to create system directory nfs Jul 2 07:56:50.367015 kernel: Failed to create system directory nfs Jul 2 07:56:50.367069 kernel: Failed to create system directory nfs Jul 2 07:56:50.367089 kernel: Failed to create system directory nfs Jul 2 07:56:50.367106 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.370321 kernel: Failed to create system directory nfs Jul 2 07:56:50.370439 kernel: Failed to create system directory nfs Jul 2 07:56:50.370457 kernel: Failed to create system directory nfs Jul 2 07:56:50.370474 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.372002 kernel: Failed to create system directory nfs Jul 2 07:56:50.372114 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.374026 kernel: Failed to create system directory nfs Jul 2 07:56:50.374122 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.374710 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.375987 kernel: Failed to create system directory nfs Jul 2 07:56:50.376086 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.378472 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.381721 kernel: Failed to create system directory nfs Jul 2 07:56:50.381845 kernel: Failed to create system directory nfs Jul 2 07:56:50.381874 kernel: Failed to create system directory nfs Jul 2 07:56:50.381915 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.382910 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.387524 kernel: Failed to create system directory nfs Jul 2 07:56:50.387669 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.395203 kernel: Failed to create system directory nfs Jul 2 07:56:50.395310 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.395786 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.398059 kernel: Failed to create system directory nfs Jul 2 07:56:50.398198 kernel: Failed to create system directory nfs Jul 2 07:56:50.398263 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.400092 kernel: Failed to create system directory nfs Jul 2 07:56:50.400213 kernel: Failed to create system directory nfs Jul 2 07:56:50.400283 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.400583 env[1299]: time="2024-07-02T07:56:50.400533093Z" level=info msg="StartContainer for \"a6eed5796fff87e43b9015a3cc281f7370221774e89aeaedbd849b762c5282e5\" returns successfully" Jul 2 07:56:50.402405 kernel: Failed to create system directory nfs Jul 2 07:56:50.402525 kernel: Failed to create system directory nfs Jul 2 07:56:50.402546 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.404725 kernel: Failed to create system directory nfs Jul 2 07:56:50.404823 kernel: Failed to create system directory nfs Jul 2 07:56:50.404843 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.409422 kernel: Failed to create system directory nfs Jul 2 07:56:50.409594 kernel: Failed to create system directory nfs Jul 2 07:56:50.409630 kernel: Failed to create system directory nfs Jul 2 07:56:50.409657 kernel: Failed to create system directory nfs Jul 2 07:56:50.409684 kernel: Failed to create system directory nfs Jul 2 07:56:50.409738 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.411623 kernel: Failed to create system directory nfs Jul 2 07:56:50.411741 kernel: Failed to create system directory nfs Jul 2 07:56:50.411762 kernel: Failed to create system directory nfs Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.339000 audit[3187]: AVC avc: denied { confidentiality } for pid=3187 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.444307 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 2 07:56:50.339000 audit[3187]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562361a30790 a1=16dba4 a2=5623605ca2b0 a3=5 items=0 ppid=462 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.339000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 2 07:56:50.485000 audit[3236]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=3236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:50.485000 audit[3236]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeb0acb120 a2=0 a3=7ffeb0acb10c items=0 ppid=1817 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:50.489000 audit[3236]: NETFILTER_CFG table=nat:84 family=2 entries=44 op=nft_register_rule pid=3236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:50.489000 audit[3236]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffeb0acb120 a2=0 a3=7ffeb0acb10c items=0 ppid=1817 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.522763 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.522873 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.522901 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.524405 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.524494 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.526289 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.526354 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.528440 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.528517 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.531865 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.531958 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.531988 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.532020 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.533416 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.533486 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.535928 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.536025 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.536055 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.537453 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.537532 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.539952 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.540030 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.540074 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.541488 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.541575 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.543324 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.543399 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.544964 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.545039 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.546590 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.546685 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.548346 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.548462 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.550403 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.550483 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.551270 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.552879 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.552984 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.554431 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.554500 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.555999 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.556076 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.557546 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.557611 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.559387 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.559483 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.561068 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.561156 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.562863 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.562953 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.564513 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.564617 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.566419 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.566493 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.567502 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.569948 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.570040 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.570199 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.571503 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.571575 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.573316 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.573418 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.574989 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.575099 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.576974 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.577975 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.578876 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.579756 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.579830 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.582378 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.586447 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.588414 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.588512 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.590260 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.592289 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.595264 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.599494 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.601455 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.601595 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.602583 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.613918 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.614083 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.615367 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.617268 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.617373 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.619602 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.619751 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.620789 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.621716 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.622824 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.623841 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.624809 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.625926 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.627004 kernel: Failed to create system directory nfs4 Jul 2 07:56:50.502000 audit[3234]: AVC avc: denied { confidentiality } for pid=3234 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.789740 kernel: NFS: Registering the id_resolver key type Jul 2 07:56:50.789963 kernel: Key type id_resolver registered Jul 2 07:56:50.790014 kernel: Key type id_legacy registered Jul 2 07:56:50.502000 audit[3234]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f30d64e0010 a1=20890c a2=563c92b002b0 a3=5 items=0 ppid=462 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.502000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.808574 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.808675 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.812284 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.816263 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.817338 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.818349 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.819689 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.819756 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.820509 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.821270 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.822772 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.822832 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.823518 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.821000 audit[3244]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=3244 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:50.821000 audit[3244]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc7646d2f0 a2=0 a3=7ffc7646d2dc items=0 ppid=1817 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.824367 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.825267 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.826703 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.826757 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.827451 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.828799 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.828874 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.829641 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.827000 audit[3244]: NETFILTER_CFG table=nat:86 family=2 entries=44 op=nft_register_rule pid=3244 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:50.827000 audit[3244]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc7646d2f0 a2=0 a3=7ffc7646d2dc items=0 ppid=1817 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:50.830708 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.831576 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.832323 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.833668 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.833715 kernel: Failed to create system directory rpcgss Jul 2 07:56:50.801000 audit[3242]: AVC avc: denied { confidentiality } for pid=3242 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 2 07:56:50.801000 audit[3242]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fec9a33c010 a1=70bec a2=563efae762b0 a3=5 items=0 ppid=462 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:50.801000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 2 07:56:50.960225 systemd[1]: run-containerd-runc-k8s.io-a6eed5796fff87e43b9015a3cc281f7370221774e89aeaedbd849b762c5282e5-runc.YSyPEt.mount: Deactivated successfully. Jul 2 07:56:51.102427 kubelet[1596]: E0702 07:56:51.102273 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:51.415145 kubelet[1596]: I0702 07:56:51.414956 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-97d7654fc-75dn4" podStartSLOduration=3.407025755 podCreationTimestamp="2024-07-02 07:56:45 +0000 UTC" firstStartedPulling="2024-07-02 07:56:47.181498906 +0000 UTC m=+62.688806230" lastFinishedPulling="2024-07-02 07:56:50.189367924 +0000 UTC m=+65.696675242" observedRunningTime="2024-07-02 07:56:50.468270701 +0000 UTC m=+65.975578033" watchObservedRunningTime="2024-07-02 07:56:51.414894767 +0000 UTC m=+66.922202097" Jul 2 07:56:51.839000 audit[3254]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:51.839000 audit[3254]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffce62c3b0 a2=0 a3=7fffce62c39c items=0 ppid=1817 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:51.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:51.841000 audit[3254]: NETFILTER_CFG table=nat:88 family=2 entries=55 op=nft_register_chain pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 07:56:51.841000 audit[3254]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7fffce62c3b0 a2=0 a3=7fffce62c39c items=0 ppid=1817 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:56:51.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 07:56:52.103251 kubelet[1596]: E0702 07:56:52.102908 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:53.104584 kubelet[1596]: E0702 07:56:53.104526 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:54.105413 kubelet[1596]: E0702 07:56:54.105362 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:55.107118 kubelet[1596]: E0702 07:56:55.107036 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:56.108112 kubelet[1596]: E0702 07:56:56.108042 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:57.006618 nfsidmap[3252]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-5-0ac503668a' Jul 2 07:56:57.109343 kubelet[1596]: E0702 07:56:57.109276 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:58.110255 kubelet[1596]: E0702 07:56:58.110153 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:56:59.112370 kubelet[1596]: E0702 07:56:59.112261 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:00.112787 kubelet[1596]: E0702 07:57:00.112725 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:01.113452 kubelet[1596]: E0702 07:57:01.113378 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:02.115337 kubelet[1596]: E0702 07:57:02.115271 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:03.115893 kubelet[1596]: E0702 07:57:03.115828 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:03.141120 nfsidmap[3259]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.5-5-0ac503668a' Jul 2 07:57:03.171483 kernel: kauditd_printk_skb: 353 callbacks suppressed Jul 2 07:57:03.171662 kernel: audit: type=1400 audit(1719907023.159:315): avc: denied { watch_reads } for pid=1388 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.171707 kernel: audit: type=1400 audit(1719907023.159:316): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.171738 kernel: audit: type=1400 audit(1719907023.159:317): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.159000 audit[1388]: AVC avc: denied { watch_reads } for pid=1388 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.159000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.159000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.176332 kernel: audit: type=1300 audit(1719907023.159:315): arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55d1b836f6a0 a2=10 a3=bed0d1d46a3ab2dd items=0 ppid=1 pid=1388 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.159000 audit[1388]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55d1b836f6a0 a2=10 a3=bed0d1d46a3ab2dd items=0 ppid=1 pid=1388 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.178472 kernel: audit: type=1327 audit(1719907023.159:315): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:57:03.159000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:57:03.182815 kernel: audit: type=1400 audit(1719907023.164:318): avc: denied { watch_reads } for pid=1388 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.164000 audit[1388]: AVC avc: denied { watch_reads } for pid=1388 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 2 07:57:03.164000 audit[1388]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55d1b836f6a0 a2=10 a3=bed0d1d46a3ab2dd items=0 ppid=1 pid=1388 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.187896 kernel: audit: type=1300 audit(1719907023.164:318): arch=c000003e syscall=254 success=no exit=-13 a0=d a1=55d1b836f6a0 a2=10 a3=bed0d1d46a3ab2dd items=0 ppid=1 pid=1388 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.188070 kernel: audit: type=1327 audit(1719907023.164:318): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:57:03.164000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 2 07:57:03.213388 env[1299]: time="2024-07-02T07:57:03.213134455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:709e30e4-45b2-4e29-aef6-6487be1c64e6,Namespace:default,Attempt:0,}" Jul 2 07:57:03.389582 systemd-networkd[1058]: cali5ec59c6bf6e: Link UP Jul 2 07:57:03.398891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 07:57:03.399138 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 2 07:57:03.399159 systemd-networkd[1058]: cali5ec59c6bf6e: Gained carrier Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.282 [INFO][3277] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {64.23.144.187-k8s-test--pod--1-eth0 default 709e30e4-45b2-4e29-aef6-6487be1c64e6 1235 0 2024-07-02 07:56:33 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 64.23.144.187 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.283 [INFO][3277] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.325 [INFO][3290] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" HandleID="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Workload="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.339 [INFO][3290] ipam_plugin.go 264: Auto assigning IP ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" HandleID="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Workload="64.23.144.187-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001169b0), Attrs:map[string]string{"namespace":"default", "node":"64.23.144.187", "pod":"test-pod-1", "timestamp":"2024-07-02 07:57:03.325250898 +0000 UTC"}, Hostname:"64.23.144.187", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.339 [INFO][3290] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.339 [INFO][3290] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.339 [INFO][3290] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '64.23.144.187' Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.342 [INFO][3290] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.349 [INFO][3290] ipam.go 372: Looking up existing affinities for host host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.359 [INFO][3290] ipam.go 489: Trying affinity for 192.168.79.128/26 host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.363 [INFO][3290] ipam.go 155: Attempting to load block cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.367 [INFO][3290] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.79.128/26 host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.367 [INFO][3290] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.79.128/26 handle="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.369 [INFO][3290] ipam.go 1685: Creating new handle: k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.375 [INFO][3290] ipam.go 1203: Writing block in order to claim IPs block=192.168.79.128/26 handle="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.383 [INFO][3290] ipam.go 1216: Successfully claimed IPs: [192.168.79.133/26] block=192.168.79.128/26 handle="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.383 [INFO][3290] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.79.133/26] handle="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" host="64.23.144.187" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.383 [INFO][3290] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.383 [INFO][3290] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.79.133/26] IPv6=[] ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" HandleID="k8s-pod-network.c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Workload="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.385 [INFO][3277] k8s.go 386: Populated endpoint ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"709e30e4-45b2-4e29-aef6-6487be1c64e6", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:03.416529 env[1299]: 2024-07-02 07:57:03.385 [INFO][3277] k8s.go 387: Calico CNI using IPs: [192.168.79.133/32] ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.417454 env[1299]: 2024-07-02 07:57:03.386 [INFO][3277] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.417454 env[1299]: 2024-07-02 07:57:03.402 [INFO][3277] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.417454 env[1299]: 2024-07-02 07:57:03.403 [INFO][3277] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"64.23.144.187-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"709e30e4-45b2-4e29-aef6-6487be1c64e6", ResourceVersion:"1235", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 56, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"64.23.144.187", ContainerID:"c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.79.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"76:da:5b:dc:24:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 07:57:03.417454 env[1299]: 2024-07-02 07:57:03.411 [INFO][3277] k8s.go 500: Wrote updated endpoint to datastore ContainerID="c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="64.23.144.187-k8s-test--pod--1-eth0" Jul 2 07:57:03.431000 audit[3304]: NETFILTER_CFG table=filter:89 family=2 entries=44 op=nft_register_chain pid=3304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:03.431000 audit[3304]: SYSCALL arch=c000003e syscall=46 success=yes exit=22236 a0=3 a1=7ffc39f1bf10 a2=0 a3=7ffc39f1befc items=0 ppid=2227 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.441008 kernel: audit: type=1325 audit(1719907023.431:319): table=filter:89 family=2 entries=44 op=nft_register_chain pid=3304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 07:57:03.441168 kernel: audit: type=1300 audit(1719907023.431:319): arch=c000003e syscall=46 success=yes exit=22236 a0=3 a1=7ffc39f1bf10 a2=0 a3=7ffc39f1befc items=0 ppid=2227 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 07:57:03.431000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 07:57:03.446344 env[1299]: time="2024-07-02T07:57:03.445913729Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 07:57:03.446344 env[1299]: time="2024-07-02T07:57:03.445990606Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 07:57:03.446344 env[1299]: time="2024-07-02T07:57:03.446010087Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 07:57:03.446799 env[1299]: time="2024-07-02T07:57:03.446630695Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f pid=3317 runtime=io.containerd.runc.v2 Jul 2 07:57:03.526670 env[1299]: time="2024-07-02T07:57:03.526617133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:709e30e4-45b2-4e29-aef6-6487be1c64e6,Namespace:default,Attempt:0,} returns sandbox id \"c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f\"" Jul 2 07:57:03.537951 env[1299]: time="2024-07-02T07:57:03.537906351Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 2 07:57:03.888272 env[1299]: time="2024-07-02T07:57:03.888185344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:03.891199 env[1299]: time="2024-07-02T07:57:03.891145166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:03.892734 env[1299]: time="2024-07-02T07:57:03.892679041Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:03.895431 env[1299]: time="2024-07-02T07:57:03.895389147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 07:57:03.896143 env[1299]: time="2024-07-02T07:57:03.896111495Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\"" Jul 2 07:57:03.900280 env[1299]: time="2024-07-02T07:57:03.900197641Z" level=info msg="CreateContainer within sandbox \"c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 2 07:57:03.912420 env[1299]: time="2024-07-02T07:57:03.912211932Z" level=info msg="CreateContainer within sandbox \"c1a2149175f6c5d82f97886de199a056f244d8813c35d223db28c8a581db520f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9e3a3f95f6c0d5f5e28f1e69b27c1b4a3fed0359b745867ec02237fbd8122511\"" Jul 2 07:57:03.913292 env[1299]: time="2024-07-02T07:57:03.913154953Z" level=info msg="StartContainer for \"9e3a3f95f6c0d5f5e28f1e69b27c1b4a3fed0359b745867ec02237fbd8122511\"" Jul 2 07:57:03.978207 env[1299]: time="2024-07-02T07:57:03.978158975Z" level=info msg="StartContainer for \"9e3a3f95f6c0d5f5e28f1e69b27c1b4a3fed0359b745867ec02237fbd8122511\" returns successfully" Jul 2 07:57:04.117749 kubelet[1596]: E0702 07:57:04.117688 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:04.496639 kubelet[1596]: I0702 07:57:04.496219 1596 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=31.128816071 podCreationTimestamp="2024-07-02 07:56:33 +0000 UTC" firstStartedPulling="2024-07-02 07:57:03.52976458 +0000 UTC m=+79.037071891" lastFinishedPulling="2024-07-02 07:57:03.897116743 +0000 UTC m=+79.404424054" observedRunningTime="2024-07-02 07:57:04.496036381 +0000 UTC m=+80.003343729" watchObservedRunningTime="2024-07-02 07:57:04.496168234 +0000 UTC m=+80.003475565" Jul 2 07:57:04.928610 systemd-networkd[1058]: cali5ec59c6bf6e: Gained IPv6LL Jul 2 07:57:05.033298 kubelet[1596]: E0702 07:57:05.033223 1596 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:05.118038 kubelet[1596]: E0702 07:57:05.117952 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:06.119165 kubelet[1596]: E0702 07:57:06.119037 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:07.120416 kubelet[1596]: E0702 07:57:07.120335 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 2 07:57:08.121650 kubelet[1596]: E0702 07:57:08.121571 1596 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"