Apr 12 18:52:46.021377 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:52:46.021413 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:46.021429 kernel: BIOS-provided physical RAM map: Apr 12 18:52:46.021440 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:52:46.021451 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:52:46.021462 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:52:46.021478 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable Apr 12 18:52:46.021489 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved Apr 12 18:52:46.021575 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved Apr 12 18:52:46.021589 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:52:46.021641 kernel: NX (Execute Disable) protection: active Apr 12 18:52:46.021654 kernel: SMBIOS 2.7 present. Apr 12 18:52:46.021666 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Apr 12 18:52:46.021678 kernel: Hypervisor detected: KVM Apr 12 18:52:46.021734 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:52:46.021749 kernel: kvm-clock: cpu 0, msr 7c191001, primary cpu clock Apr 12 18:52:46.021762 kernel: kvm-clock: using sched offset of 7079286501 cycles Apr 12 18:52:46.021867 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:52:46.021931 kernel: tsc: Detected 2500.004 MHz processor Apr 12 18:52:46.021945 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:52:46.021963 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:52:46.021976 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000 Apr 12 18:52:46.021989 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:52:46.022002 kernel: Using GB pages for direct mapping Apr 12 18:52:46.022015 kernel: ACPI: Early table checksum verification disabled Apr 12 18:52:46.022028 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON) Apr 12 18:52:46.022040 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001) Apr 12 18:52:46.022054 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Apr 12 18:52:46.022067 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Apr 12 18:52:46.022084 kernel: ACPI: FACS 0x000000007D9EFF40 000040 Apr 12 18:52:46.022097 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Apr 12 18:52:46.022111 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Apr 12 18:52:46.022123 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Apr 12 18:52:46.022136 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Apr 12 18:52:46.022150 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Apr 12 18:52:46.022163 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Apr 12 18:52:46.022176 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Apr 12 18:52:46.022191 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3] Apr 12 18:52:46.022203 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488] Apr 12 18:52:46.022216 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f] Apr 12 18:52:46.022234 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39] Apr 12 18:52:46.022248 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645] Apr 12 18:52:46.022263 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf] Apr 12 18:52:46.022277 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b] Apr 12 18:52:46.022293 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7] Apr 12 18:52:46.022307 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037] Apr 12 18:52:46.022322 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba] Apr 12 18:52:46.022335 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:52:46.022349 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 18:52:46.022363 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Apr 12 18:52:46.022378 kernel: NUMA: Initialized distance table, cnt=1 Apr 12 18:52:46.022392 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff] Apr 12 18:52:46.022409 kernel: Zone ranges: Apr 12 18:52:46.022423 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:52:46.022437 kernel: DMA32 [mem 0x0000000001000000-0x000000007d9e9fff] Apr 12 18:52:46.022451 kernel: Normal empty Apr 12 18:52:46.022465 kernel: Movable zone start for each node Apr 12 18:52:46.022478 kernel: Early memory node ranges Apr 12 18:52:46.022491 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:52:46.022505 kernel: node 0: [mem 0x0000000000100000-0x000000007d9e9fff] Apr 12 18:52:46.022518 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff] Apr 12 18:52:46.022536 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:52:46.022551 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:52:46.022566 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges Apr 12 18:52:46.022580 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 18:52:46.022594 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:52:46.022610 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Apr 12 18:52:46.022687 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:52:46.022700 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:52:46.022714 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:52:46.022732 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:52:46.022745 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:52:46.022759 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 18:52:46.022773 kernel: TSC deadline timer available Apr 12 18:52:46.022787 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:52:46.022801 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices Apr 12 18:52:46.022814 kernel: Booting paravirtualized kernel on KVM Apr 12 18:52:46.022826 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:52:46.022839 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:52:46.022856 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:52:46.022870 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:52:46.022884 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:52:46.022898 kernel: kvm-guest: stealtime: cpu 0, msr 7d61c0c0 Apr 12 18:52:46.022934 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:52:46.022949 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:52:46.022963 kernel: Built 1 zonelists, mobility grouping on. Total pages: 506242 Apr 12 18:52:46.022978 kernel: Policy zone: DMA32 Apr 12 18:52:46.022995 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:46.023066 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:52:46.023082 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:52:46.023096 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:52:46.023110 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:52:46.023124 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 123080K reserved, 0K cma-reserved) Apr 12 18:52:46.023139 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:52:46.023153 kernel: Kernel/User page tables isolation: enabled Apr 12 18:52:46.023167 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:52:46.023185 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:52:46.023199 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:52:46.023213 kernel: rcu: RCU event tracing is enabled. Apr 12 18:52:46.023283 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:52:46.023299 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:52:46.023315 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:52:46.023330 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:52:46.023344 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:52:46.023358 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:52:46.023376 kernel: random: crng init done Apr 12 18:52:46.023390 kernel: Console: colour VGA+ 80x25 Apr 12 18:52:46.023404 kernel: printk: console [ttyS0] enabled Apr 12 18:52:46.023418 kernel: ACPI: Core revision 20210730 Apr 12 18:52:46.023433 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Apr 12 18:52:46.023447 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:52:46.023461 kernel: x2apic enabled Apr 12 18:52:46.023475 kernel: Switched APIC routing to physical x2apic. Apr 12 18:52:46.023490 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns Apr 12 18:52:46.023508 kernel: Calibrating delay loop (skipped) preset value.. 5000.00 BogoMIPS (lpj=2500004) Apr 12 18:52:46.023522 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 18:52:46.023536 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 18:52:46.023551 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:52:46.023576 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:52:46.023593 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:52:46.023608 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:52:46.023624 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Apr 12 18:52:46.023638 kernel: RETBleed: Vulnerable Apr 12 18:52:46.023653 kernel: Speculative Store Bypass: Vulnerable Apr 12 18:52:46.023668 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:52:46.023683 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:52:46.023698 kernel: GDS: Unknown: Dependent on hypervisor status Apr 12 18:52:46.023713 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:52:46.023840 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:52:46.023858 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:52:46.023873 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 18:52:46.023888 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 18:52:46.023922 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Apr 12 18:52:46.023942 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Apr 12 18:52:46.023957 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Apr 12 18:52:46.023971 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Apr 12 18:52:46.023985 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:52:46.023999 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 18:52:46.024013 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 18:52:46.024157 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Apr 12 18:52:46.024172 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Apr 12 18:52:46.024188 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Apr 12 18:52:46.024202 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Apr 12 18:52:46.024217 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Apr 12 18:52:46.024231 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:52:46.024250 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:52:46.024264 kernel: LSM: Security Framework initializing Apr 12 18:52:46.024278 kernel: SELinux: Initializing. Apr 12 18:52:46.024292 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:52:46.024306 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Apr 12 18:52:46.024322 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Apr 12 18:52:46.024337 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Apr 12 18:52:46.024352 kernel: signal: max sigframe size: 3632 Apr 12 18:52:46.024368 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:52:46.024383 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:52:46.024401 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:52:46.024416 kernel: x86: Booting SMP configuration: Apr 12 18:52:46.024431 kernel: .... node #0, CPUs: #1 Apr 12 18:52:46.024446 kernel: kvm-clock: cpu 1, msr 7c191041, secondary cpu clock Apr 12 18:52:46.024461 kernel: kvm-guest: stealtime: cpu 1, msr 7d71c0c0 Apr 12 18:52:46.024478 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 18:52:46.024494 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 18:52:46.024509 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:52:46.024588 kernel: smpboot: Max logical packages: 1 Apr 12 18:52:46.024612 kernel: smpboot: Total of 2 processors activated (10000.01 BogoMIPS) Apr 12 18:52:46.024629 kernel: devtmpfs: initialized Apr 12 18:52:46.024643 kernel: x86/mm: Memory block size: 128MB Apr 12 18:52:46.024659 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:52:46.024676 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:52:46.024692 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:52:46.024708 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:52:46.024723 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:52:46.024738 kernel: audit: type=2000 audit(1712947965.290:1): state=initialized audit_enabled=0 res=1 Apr 12 18:52:46.024756 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:52:46.024771 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:52:46.024787 kernel: cpuidle: using governor menu Apr 12 18:52:46.024801 kernel: ACPI: bus type PCI registered Apr 12 18:52:46.024816 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:52:46.024831 kernel: dca service started, version 1.12.1 Apr 12 18:52:46.024846 kernel: PCI: Using configuration type 1 for base access Apr 12 18:52:46.024862 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:52:46.024877 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:52:46.024895 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:52:46.025494 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:52:46.025513 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:52:46.025706 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:52:46.025727 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:52:46.025744 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:52:46.025785 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:52:46.025802 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:52:46.025816 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 18:52:46.026025 kernel: ACPI: Interpreter enabled Apr 12 18:52:46.026072 kernel: ACPI: PM: (supports S0 S5) Apr 12 18:52:46.026087 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:52:46.026102 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:52:46.026143 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 18:52:46.026156 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:52:46.026679 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:52:46.026874 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:52:46.026916 kernel: acpiphp: Slot [3] registered Apr 12 18:52:46.026930 kernel: acpiphp: Slot [4] registered Apr 12 18:52:46.027038 kernel: acpiphp: Slot [5] registered Apr 12 18:52:46.027056 kernel: acpiphp: Slot [6] registered Apr 12 18:52:46.027070 kernel: acpiphp: Slot [7] registered Apr 12 18:52:46.027085 kernel: acpiphp: Slot [8] registered Apr 12 18:52:46.027100 kernel: acpiphp: Slot [9] registered Apr 12 18:52:46.027115 kernel: acpiphp: Slot [10] registered Apr 12 18:52:46.027135 kernel: acpiphp: Slot [11] registered Apr 12 18:52:46.027149 kernel: acpiphp: Slot [12] registered Apr 12 18:52:46.027164 kernel: acpiphp: Slot [13] registered Apr 12 18:52:46.027178 kernel: acpiphp: Slot [14] registered Apr 12 18:52:46.027191 kernel: acpiphp: Slot [15] registered Apr 12 18:52:46.027204 kernel: acpiphp: Slot [16] registered Apr 12 18:52:46.027219 kernel: acpiphp: Slot [17] registered Apr 12 18:52:46.027234 kernel: acpiphp: Slot [18] registered Apr 12 18:52:46.027249 kernel: acpiphp: Slot [19] registered Apr 12 18:52:46.027264 kernel: acpiphp: Slot [20] registered Apr 12 18:52:46.027281 kernel: acpiphp: Slot [21] registered Apr 12 18:52:46.027296 kernel: acpiphp: Slot [22] registered Apr 12 18:52:46.027311 kernel: acpiphp: Slot [23] registered Apr 12 18:52:46.027325 kernel: acpiphp: Slot [24] registered Apr 12 18:52:46.027340 kernel: acpiphp: Slot [25] registered Apr 12 18:52:46.027355 kernel: acpiphp: Slot [26] registered Apr 12 18:52:46.027369 kernel: acpiphp: Slot [27] registered Apr 12 18:52:46.027384 kernel: acpiphp: Slot [28] registered Apr 12 18:52:46.027399 kernel: acpiphp: Slot [29] registered Apr 12 18:52:46.027416 kernel: acpiphp: Slot [30] registered Apr 12 18:52:46.027431 kernel: acpiphp: Slot [31] registered Apr 12 18:52:46.027446 kernel: PCI host bridge to bus 0000:00 Apr 12 18:52:46.027589 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:52:46.027743 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:52:46.029009 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:52:46.029149 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Apr 12 18:52:46.029265 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:52:46.029420 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:52:46.029553 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:52:46.029815 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Apr 12 18:52:46.029960 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 18:52:46.030319 kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB Apr 12 18:52:46.030485 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Apr 12 18:52:46.030621 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Apr 12 18:52:46.030749 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Apr 12 18:52:46.030878 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Apr 12 18:52:46.031077 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Apr 12 18:52:46.031210 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Apr 12 18:52:46.031337 kernel: pci 0000:00:01.3: quirk_piix4_acpi+0x0/0x170 took 23437 usecs Apr 12 18:52:46.031553 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Apr 12 18:52:46.031687 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref] Apr 12 18:52:46.031819 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Apr 12 18:52:46.032727 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:52:46.032965 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Apr 12 18:52:46.033269 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff] Apr 12 18:52:46.033577 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Apr 12 18:52:46.034212 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff] Apr 12 18:52:46.034244 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:52:46.034259 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:52:46.034272 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:52:46.034285 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:52:46.034298 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:52:46.034311 kernel: iommu: Default domain type: Translated Apr 12 18:52:46.034324 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:52:46.034537 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Apr 12 18:52:46.034670 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:52:46.034804 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Apr 12 18:52:46.034824 kernel: vgaarb: loaded Apr 12 18:52:46.034840 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:52:46.034856 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:52:46.034871 kernel: PTP clock support registered Apr 12 18:52:46.034886 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:52:46.034977 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:52:46.034989 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:52:46.035067 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff] Apr 12 18:52:46.035081 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Apr 12 18:52:46.035094 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Apr 12 18:52:46.035105 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:52:46.035149 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:52:46.035163 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:52:46.035177 kernel: pnp: PnP ACPI init Apr 12 18:52:46.035188 kernel: pnp: PnP ACPI: found 5 devices Apr 12 18:52:46.035229 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:52:46.035245 kernel: NET: Registered PF_INET protocol family Apr 12 18:52:46.035257 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:52:46.035270 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Apr 12 18:52:46.035309 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:52:46.035323 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:52:46.035337 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 18:52:46.035351 kernel: TCP: Hash tables configured (established 16384 bind 16384) Apr 12 18:52:46.035365 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:52:46.035405 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Apr 12 18:52:46.035422 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:52:46.035436 kernel: NET: Registered PF_XDP protocol family Apr 12 18:52:46.035833 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:52:46.036227 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:52:46.036359 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:52:46.036474 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Apr 12 18:52:46.036685 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:52:46.036823 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:52:46.036884 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:52:46.036898 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:52:46.036932 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093d6e846, max_idle_ns: 440795249997 ns Apr 12 18:52:46.036948 kernel: clocksource: Switched to clocksource tsc Apr 12 18:52:46.036962 kernel: Initialise system trusted keyrings Apr 12 18:52:46.036977 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Apr 12 18:52:46.036992 kernel: Key type asymmetric registered Apr 12 18:52:46.037006 kernel: Asymmetric key parser 'x509' registered Apr 12 18:52:46.037025 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:52:46.037040 kernel: io scheduler mq-deadline registered Apr 12 18:52:46.037053 kernel: io scheduler kyber registered Apr 12 18:52:46.037067 kernel: io scheduler bfq registered Apr 12 18:52:46.037080 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:52:46.037095 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:52:46.037109 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:52:46.037124 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:52:46.037139 kernel: i8042: Warning: Keylock active Apr 12 18:52:46.037157 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:52:46.037347 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:52:46.037529 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 18:52:46.037693 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 18:52:46.037887 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:52:45 UTC (1712947965) Apr 12 18:52:46.038571 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 18:52:46.038597 kernel: intel_pstate: CPU model not supported Apr 12 18:52:46.038611 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:52:46.038628 kernel: Segment Routing with IPv6 Apr 12 18:52:46.038639 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:52:46.038652 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:52:46.038666 kernel: Key type dns_resolver registered Apr 12 18:52:46.038680 kernel: IPI shorthand broadcast: enabled Apr 12 18:52:46.038693 kernel: sched_clock: Marking stable (579464750, 257663495)->(982532636, -145404391) Apr 12 18:52:46.038708 kernel: registered taskstats version 1 Apr 12 18:52:46.038721 kernel: Loading compiled-in X.509 certificates Apr 12 18:52:46.038735 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:52:46.038751 kernel: Key type .fscrypt registered Apr 12 18:52:46.038764 kernel: Key type fscrypt-provisioning registered Apr 12 18:52:46.038777 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:52:46.038791 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:52:46.038916 kernel: ima: No architecture policies found Apr 12 18:52:46.038930 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:52:46.038943 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:52:46.038956 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:52:46.038972 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:52:46.038986 kernel: Run /init as init process Apr 12 18:52:46.039035 kernel: with arguments: Apr 12 18:52:46.039069 kernel: /init Apr 12 18:52:46.039083 kernel: with environment: Apr 12 18:52:46.039097 kernel: HOME=/ Apr 12 18:52:46.039109 kernel: TERM=linux Apr 12 18:52:46.039122 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:52:46.039140 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:52:46.039160 systemd[1]: Detected virtualization amazon. Apr 12 18:52:46.039175 systemd[1]: Detected architecture x86-64. Apr 12 18:52:46.039188 systemd[1]: Running in initrd. Apr 12 18:52:46.039202 systemd[1]: No hostname configured, using default hostname. Apr 12 18:52:46.039235 systemd[1]: Hostname set to . Apr 12 18:52:46.039256 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:52:46.039270 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:52:46.039285 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:52:46.039300 systemd[1]: Reached target cryptsetup.target. Apr 12 18:52:46.039314 systemd[1]: Reached target paths.target. Apr 12 18:52:46.039329 systemd[1]: Reached target slices.target. Apr 12 18:52:46.039342 systemd[1]: Reached target swap.target. Apr 12 18:52:46.039357 systemd[1]: Reached target timers.target. Apr 12 18:52:46.039375 systemd[1]: Listening on iscsid.socket. Apr 12 18:52:46.039390 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:52:46.039405 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:52:46.039420 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:52:46.039435 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:52:46.039449 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:52:46.039464 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:52:46.039479 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:52:46.039497 systemd[1]: Reached target sockets.target. Apr 12 18:52:46.039512 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:52:46.039527 systemd[1]: Finished network-cleanup.service. Apr 12 18:52:46.039541 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:52:46.039557 systemd[1]: Starting systemd-journald.service... Apr 12 18:52:46.039571 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:52:46.039586 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:52:46.039601 systemd[1]: Starting systemd-resolved.service... Apr 12 18:52:46.039615 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:52:46.039639 systemd-journald[184]: Journal started Apr 12 18:52:46.039713 systemd-journald[184]: Runtime Journal (/run/log/journal/ec21670d3113f1a75c5658f25afaf6cf) is 4.8M, max 38.7M, 33.9M free. Apr 12 18:52:46.046948 systemd[1]: Started systemd-journald.service. Apr 12 18:52:46.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.056967 kernel: audit: type=1130 audit(1712947966.046:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.064895 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:52:46.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.075484 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:52:46.260188 kernel: audit: type=1130 audit(1712947966.074:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.260223 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:52:46.260241 kernel: Bridge firewalling registered Apr 12 18:52:46.260262 kernel: SCSI subsystem initialized Apr 12 18:52:46.260282 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:52:46.260299 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:52:46.260317 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:52:46.081030 systemd-modules-load[185]: Inserted module 'overlay' Apr 12 18:52:46.090821 systemd-resolved[186]: Positive Trust Anchors: Apr 12 18:52:46.280166 kernel: audit: type=1130 audit(1712947966.269:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.090839 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:52:46.294791 kernel: audit: type=1130 audit(1712947966.280:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.090890 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:52:46.316410 kernel: audit: type=1130 audit(1712947966.299:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.095985 systemd-resolved[186]: Defaulting to hostname 'linux'. Apr 12 18:52:46.322868 kernel: audit: type=1130 audit(1712947966.316:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.150409 systemd-modules-load[185]: Inserted module 'br_netfilter' Apr 12 18:52:46.203012 systemd-modules-load[185]: Inserted module 'dm_multipath' Apr 12 18:52:46.269913 systemd[1]: Started systemd-resolved.service. Apr 12 18:52:46.281466 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:52:46.300074 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:52:46.324173 systemd[1]: Reached target nss-lookup.target. Apr 12 18:52:46.328506 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:52:46.329784 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:52:46.330514 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:52:46.370315 kernel: audit: type=1130 audit(1712947966.354:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.355500 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:52:46.381330 kernel: audit: type=1130 audit(1712947966.375:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.376095 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:52:46.382364 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:52:46.383585 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:52:46.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.392696 kernel: audit: type=1130 audit(1712947966.381:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.396411 dracut-cmdline[206]: dracut-dracut-053 Apr 12 18:52:46.399142 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:46.465947 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:52:46.485967 kernel: iscsi: registered transport (tcp) Apr 12 18:52:46.513524 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:52:46.513600 kernel: QLogic iSCSI HBA Driver Apr 12 18:52:46.548634 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:52:46.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:46.551549 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:52:46.604963 kernel: raid6: avx512x4 gen() 15303 MB/s Apr 12 18:52:46.623716 kernel: raid6: avx512x4 xor() 7556 MB/s Apr 12 18:52:46.642314 kernel: raid6: avx512x2 gen() 10189 MB/s Apr 12 18:52:46.662793 kernel: raid6: avx512x2 xor() 12988 MB/s Apr 12 18:52:46.679955 kernel: raid6: avx512x1 gen() 7179 MB/s Apr 12 18:52:46.697951 kernel: raid6: avx512x1 xor() 19151 MB/s Apr 12 18:52:46.714940 kernel: raid6: avx2x4 gen() 13806 MB/s Apr 12 18:52:46.731938 kernel: raid6: avx2x4 xor() 6864 MB/s Apr 12 18:52:46.749006 kernel: raid6: avx2x2 gen() 13429 MB/s Apr 12 18:52:46.765952 kernel: raid6: avx2x2 xor() 17444 MB/s Apr 12 18:52:46.783953 kernel: raid6: avx2x1 gen() 10583 MB/s Apr 12 18:52:46.801952 kernel: raid6: avx2x1 xor() 15202 MB/s Apr 12 18:52:46.818939 kernel: raid6: sse2x4 gen() 8802 MB/s Apr 12 18:52:46.836997 kernel: raid6: sse2x4 xor() 5936 MB/s Apr 12 18:52:46.854951 kernel: raid6: sse2x2 gen() 10034 MB/s Apr 12 18:52:46.871932 kernel: raid6: sse2x2 xor() 6049 MB/s Apr 12 18:52:46.888940 kernel: raid6: sse2x1 gen() 7694 MB/s Apr 12 18:52:46.907064 kernel: raid6: sse2x1 xor() 4573 MB/s Apr 12 18:52:46.907138 kernel: raid6: using algorithm avx512x4 gen() 15303 MB/s Apr 12 18:52:46.907157 kernel: raid6: .... xor() 7556 MB/s, rmw enabled Apr 12 18:52:46.908203 kernel: raid6: using avx512x2 recovery algorithm Apr 12 18:52:46.923936 kernel: xor: automatically using best checksumming function avx Apr 12 18:52:47.034931 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:52:47.050086 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:52:47.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:47.053000 audit: BPF prog-id=7 op=LOAD Apr 12 18:52:47.053000 audit: BPF prog-id=8 op=LOAD Apr 12 18:52:47.054850 systemd[1]: Starting systemd-udevd.service... Apr 12 18:52:47.074324 systemd-udevd[384]: Using default interface naming scheme 'v252'. Apr 12 18:52:47.079885 systemd[1]: Started systemd-udevd.service. Apr 12 18:52:47.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:47.082519 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:52:47.100647 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Apr 12 18:52:47.136861 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:52:47.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:47.138936 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:52:47.193252 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:52:47.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:47.248640 kernel: ena 0000:00:05.0: ENA device version: 0.10 Apr 12 18:52:47.249024 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Apr 12 18:52:47.265923 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:52:47.286991 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Apr 12 18:52:47.295004 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:e0:53:18:49:25 Apr 12 18:52:47.296637 (udev-worker)[425]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:52:47.318927 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:52:47.318990 kernel: AES CTR mode by8 optimization enabled Apr 12 18:52:47.327203 kernel: nvme nvme0: pci function 0000:00:04.0 Apr 12 18:52:47.327545 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Apr 12 18:52:47.337933 kernel: nvme nvme0: 2/0/0 default/read/poll queues Apr 12 18:52:47.340923 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:52:47.340980 kernel: GPT:9289727 != 16777215 Apr 12 18:52:47.340999 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:52:47.341017 kernel: GPT:9289727 != 16777215 Apr 12 18:52:47.341065 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:52:47.341088 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:47.423932 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (422) Apr 12 18:52:47.461601 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:52:47.581395 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:52:47.596828 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:52:47.598549 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:52:47.612083 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:52:47.617180 systemd[1]: Starting disk-uuid.service... Apr 12 18:52:47.626655 disk-uuid[585]: Primary Header is updated. Apr 12 18:52:47.626655 disk-uuid[585]: Secondary Entries is updated. Apr 12 18:52:47.626655 disk-uuid[585]: Secondary Header is updated. Apr 12 18:52:47.631927 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:47.635949 kernel: GPT:disk_guids don't match. Apr 12 18:52:47.635989 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:52:47.636001 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:47.644922 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:48.643671 disk-uuid[586]: The operation has completed successfully. Apr 12 18:52:48.647635 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Apr 12 18:52:48.798449 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:52:48.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.798563 systemd[1]: Finished disk-uuid.service. Apr 12 18:52:48.806569 systemd[1]: Starting verity-setup.service... Apr 12 18:52:48.832125 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:52:48.926026 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:52:48.939074 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:52:48.941727 systemd[1]: Finished verity-setup.service. Apr 12 18:52:48.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.066945 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:52:49.067841 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:52:49.074978 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:52:49.076495 systemd[1]: Starting ignition-setup.service... Apr 12 18:52:49.082695 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:52:49.115465 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:49.115549 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:52:49.115571 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:52:49.139931 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:52:49.156016 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:52:49.205440 systemd[1]: Finished ignition-setup.service. Apr 12 18:52:49.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.211104 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:52:49.220350 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:52:49.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.222000 audit: BPF prog-id=9 op=LOAD Apr 12 18:52:49.224608 systemd[1]: Starting systemd-networkd.service... Apr 12 18:52:49.262712 systemd-networkd[1098]: lo: Link UP Apr 12 18:52:49.262722 systemd-networkd[1098]: lo: Gained carrier Apr 12 18:52:49.265547 systemd-networkd[1098]: Enumeration completed Apr 12 18:52:49.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.265677 systemd[1]: Started systemd-networkd.service. Apr 12 18:52:49.267102 systemd[1]: Reached target network.target. Apr 12 18:52:49.268346 systemd-networkd[1098]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:52:49.269141 systemd[1]: Starting iscsiuio.service... Apr 12 18:52:49.281258 systemd[1]: Started iscsiuio.service. Apr 12 18:52:49.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.286107 systemd[1]: Starting iscsid.service... Apr 12 18:52:49.289553 iscsid[1103]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:52:49.291621 iscsid[1103]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:52:49.291621 iscsid[1103]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:52:49.291621 iscsid[1103]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:52:49.291621 iscsid[1103]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:52:49.291621 iscsid[1103]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:52:49.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.291205 systemd[1]: Started iscsid.service. Apr 12 18:52:49.301958 systemd-networkd[1098]: eth0: Link UP Apr 12 18:52:49.301967 systemd-networkd[1098]: eth0: Gained carrier Apr 12 18:52:49.314877 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:52:49.323030 systemd-networkd[1098]: eth0: DHCPv4 address 172.31.16.199/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:52:49.331998 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:52:49.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.333448 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:52:49.336527 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:52:49.338145 systemd[1]: Reached target remote-fs.target. Apr 12 18:52:49.344998 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:52:49.363582 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:52:49.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.882308 ignition[1094]: Ignition 2.14.0 Apr 12 18:52:49.882326 ignition[1094]: Stage: fetch-offline Apr 12 18:52:49.882604 ignition[1094]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.882650 ignition[1094]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.906993 ignition[1094]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.911101 ignition[1094]: Ignition finished successfully Apr 12 18:52:49.915294 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:52:49.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.928412 systemd[1]: Starting ignition-fetch.service... Apr 12 18:52:49.942790 ignition[1122]: Ignition 2.14.0 Apr 12 18:52:49.942803 ignition[1122]: Stage: fetch Apr 12 18:52:49.943119 ignition[1122]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:49.943150 ignition[1122]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:49.967619 ignition[1122]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:49.969614 ignition[1122]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.978056 ignition[1122]: INFO : PUT result: OK Apr 12 18:52:49.981639 ignition[1122]: DEBUG : parsed url from cmdline: "" Apr 12 18:52:49.984145 ignition[1122]: INFO : no config URL provided Apr 12 18:52:49.984145 ignition[1122]: INFO : reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:52:49.984145 ignition[1122]: INFO : no config at "/usr/lib/ignition/user.ign" Apr 12 18:52:49.984145 ignition[1122]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:49.997623 ignition[1122]: INFO : PUT result: OK Apr 12 18:52:49.997623 ignition[1122]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Apr 12 18:52:50.000365 ignition[1122]: INFO : GET result: OK Apr 12 18:52:50.000365 ignition[1122]: DEBUG : parsing config with SHA512: 7fcbebb99b9acabd0343bcd4346f1b0750628b70969fa69df93b7f3318c4659919fafdb3483fd59c00632f4293603795867a480182b74ffafb028b243f41b234 Apr 12 18:52:50.023525 unknown[1122]: fetched base config from "system" Apr 12 18:52:50.023538 unknown[1122]: fetched base config from "system" Apr 12 18:52:50.023544 unknown[1122]: fetched user config from "aws" Apr 12 18:52:50.027613 ignition[1122]: fetch: fetch complete Apr 12 18:52:50.027626 ignition[1122]: fetch: fetch passed Apr 12 18:52:50.027698 ignition[1122]: Ignition finished successfully Apr 12 18:52:50.031891 systemd[1]: Finished ignition-fetch.service. Apr 12 18:52:50.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.034823 systemd[1]: Starting ignition-kargs.service... Apr 12 18:52:50.051208 ignition[1128]: Ignition 2.14.0 Apr 12 18:52:50.051224 ignition[1128]: Stage: kargs Apr 12 18:52:50.052113 ignition[1128]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:50.052154 ignition[1128]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:50.062452 ignition[1128]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:50.064477 ignition[1128]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:50.067700 ignition[1128]: INFO : PUT result: OK Apr 12 18:52:50.073739 ignition[1128]: kargs: kargs passed Apr 12 18:52:50.073809 ignition[1128]: Ignition finished successfully Apr 12 18:52:50.075597 systemd[1]: Finished ignition-kargs.service. Apr 12 18:52:50.085510 kernel: kauditd_printk_skb: 20 callbacks suppressed Apr 12 18:52:50.086551 kernel: audit: type=1130 audit(1712947970.077:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.078399 systemd[1]: Starting ignition-disks.service... Apr 12 18:52:50.090370 ignition[1134]: Ignition 2.14.0 Apr 12 18:52:50.092291 ignition[1134]: Stage: disks Apr 12 18:52:50.093432 ignition[1134]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:50.093539 ignition[1134]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:50.101446 ignition[1134]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:50.103258 ignition[1134]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:50.106032 ignition[1134]: INFO : PUT result: OK Apr 12 18:52:50.110684 ignition[1134]: disks: disks passed Apr 12 18:52:50.110757 ignition[1134]: Ignition finished successfully Apr 12 18:52:50.112632 systemd[1]: Finished ignition-disks.service. Apr 12 18:52:50.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.115070 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:52:50.129694 kernel: audit: type=1130 audit(1712947970.114:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.121160 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:52:50.129665 systemd[1]: Reached target local-fs.target. Apr 12 18:52:50.130636 systemd[1]: Reached target sysinit.target. Apr 12 18:52:50.134420 systemd[1]: Reached target basic.target. Apr 12 18:52:50.136484 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:52:50.167698 systemd-fsck[1142]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 18:52:50.173181 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:52:50.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.175549 systemd[1]: Mounting sysroot.mount... Apr 12 18:52:50.191487 kernel: audit: type=1130 audit(1712947970.174:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.201922 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:52:50.202832 systemd[1]: Mounted sysroot.mount. Apr 12 18:52:50.203056 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:52:50.219412 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:52:50.229761 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:52:50.231323 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:52:50.231369 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:52:50.235482 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:52:50.262973 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:52:50.266631 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:52:50.286925 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1159) Apr 12 18:52:50.292316 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:50.292392 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:52:50.292412 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:52:50.293228 initrd-setup-root[1164]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:52:50.303928 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:52:50.306633 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:52:50.313094 initrd-setup-root[1190]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:52:50.318812 initrd-setup-root[1198]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:52:50.326377 initrd-setup-root[1206]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:52:50.510121 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:52:50.523233 kernel: audit: type=1130 audit(1712947970.509:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.525012 systemd[1]: Starting ignition-mount.service... Apr 12 18:52:50.530560 systemd[1]: Starting sysroot-boot.service... Apr 12 18:52:50.562827 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:52:50.563196 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:52:50.609132 systemd[1]: Finished sysroot-boot.service. Apr 12 18:52:50.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.630117 systemd-networkd[1098]: eth0: Gained IPv6LL Apr 12 18:52:50.633056 kernel: audit: type=1130 audit(1712947970.622:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.636771 ignition[1227]: INFO : Ignition 2.14.0 Apr 12 18:52:50.636771 ignition[1227]: INFO : Stage: mount Apr 12 18:52:50.640157 ignition[1227]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:50.640157 ignition[1227]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:50.652884 ignition[1227]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:50.654607 ignition[1227]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:50.656220 ignition[1227]: INFO : PUT result: OK Apr 12 18:52:50.662030 ignition[1227]: INFO : mount: mount passed Apr 12 18:52:50.663414 ignition[1227]: INFO : Ignition finished successfully Apr 12 18:52:50.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.674082 kernel: audit: type=1130 audit(1712947970.664:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:50.663383 systemd[1]: Finished ignition-mount.service. Apr 12 18:52:50.665692 systemd[1]: Starting ignition-files.service... Apr 12 18:52:50.681536 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:52:50.696939 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1234) Apr 12 18:52:50.701073 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:50.701170 kernel: BTRFS info (device nvme0n1p6): using free space tree Apr 12 18:52:50.701192 kernel: BTRFS info (device nvme0n1p6): has skinny extents Apr 12 18:52:50.708933 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Apr 12 18:52:50.711967 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:52:50.727876 ignition[1253]: INFO : Ignition 2.14.0 Apr 12 18:52:50.727876 ignition[1253]: INFO : Stage: files Apr 12 18:52:50.730277 ignition[1253]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:50.730277 ignition[1253]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:50.742820 ignition[1253]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:50.744450 ignition[1253]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:50.746591 ignition[1253]: INFO : PUT result: OK Apr 12 18:52:50.750309 ignition[1253]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:52:50.755000 ignition[1253]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:52:50.755000 ignition[1253]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:52:50.791749 ignition[1253]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:52:50.794040 ignition[1253]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:52:50.800324 ignition[1253]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:52:50.794074 unknown[1253]: wrote ssh authorized keys file for user: core Apr 12 18:52:50.813768 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Apr 12 18:52:50.818840 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Apr 12 18:52:50.821458 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:52:50.821458 ignition[1253]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:52:51.200261 ignition[1253]: INFO : GET result: OK Apr 12 18:52:51.540061 ignition[1253]: DEBUG : file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:52:51.543519 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:52:51.543519 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:52:51.543519 ignition[1253]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:52:51.828147 ignition[1253]: INFO : GET result: OK Apr 12 18:52:51.982284 ignition[1253]: DEBUG : file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:52:51.985358 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:52:51.985358 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:52:51.985358 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:52:51.996695 ignition[1253]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823211124" Apr 12 18:52:52.001391 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1253) Apr 12 18:52:52.001425 ignition[1253]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823211124": device or resource busy Apr 12 18:52:52.001425 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1823211124", trying btrfs: device or resource busy Apr 12 18:52:52.001425 ignition[1253]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823211124" Apr 12 18:52:52.001425 ignition[1253]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1823211124" Apr 12 18:52:52.014390 ignition[1253]: INFO : op(3): [started] unmounting "/mnt/oem1823211124" Apr 12 18:52:52.016769 ignition[1253]: INFO : op(3): [finished] unmounting "/mnt/oem1823211124" Apr 12 18:52:52.018274 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Apr 12 18:52:52.029756 systemd[1]: mnt-oem1823211124.mount: Deactivated successfully. Apr 12 18:52:52.033947 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:52:52.035975 ignition[1253]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:52:52.143355 ignition[1253]: INFO : GET result: OK Apr 12 18:52:52.435098 ignition[1253]: DEBUG : file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Apr 12 18:52:52.439408 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:52:52.439408 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:52:52.439408 ignition[1253]: INFO : GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:52:52.494684 ignition[1253]: INFO : GET result: OK Apr 12 18:52:53.073479 ignition[1253]: DEBUG : file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Apr 12 18:52:53.078611 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:52:53.078611 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:52:53.078611 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:52:53.078611 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:52:53.078611 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:52:53.078611 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:52:53.092274 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:52:53.092274 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:52:53.092274 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:52:53.104045 ignition[1253]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem862475002" Apr 12 18:52:53.105981 ignition[1253]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem862475002": device or resource busy Apr 12 18:52:53.105981 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem862475002", trying btrfs: device or resource busy Apr 12 18:52:53.105981 ignition[1253]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem862475002" Apr 12 18:52:53.112488 ignition[1253]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem862475002" Apr 12 18:52:53.112488 ignition[1253]: INFO : op(6): [started] unmounting "/mnt/oem862475002" Apr 12 18:52:53.112488 ignition[1253]: INFO : op(6): [finished] unmounting "/mnt/oem862475002" Apr 12 18:52:53.112488 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Apr 12 18:52:53.112488 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:52:53.112488 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:52:53.132736 ignition[1253]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem74808356" Apr 12 18:52:53.134625 ignition[1253]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem74808356": device or resource busy Apr 12 18:52:53.134625 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem74808356", trying btrfs: device or resource busy Apr 12 18:52:53.134625 ignition[1253]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem74808356" Apr 12 18:52:53.142240 ignition[1253]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem74808356" Apr 12 18:52:53.144157 ignition[1253]: INFO : op(9): [started] unmounting "/mnt/oem74808356" Apr 12 18:52:53.145507 ignition[1253]: INFO : op(9): [finished] unmounting "/mnt/oem74808356" Apr 12 18:52:53.145507 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Apr 12 18:52:53.145507 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:52:53.145507 ignition[1253]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:52:53.155971 systemd[1]: mnt-oem74808356.mount: Deactivated successfully. Apr 12 18:52:53.164141 ignition[1253]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3525928601" Apr 12 18:52:53.166044 ignition[1253]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3525928601": device or resource busy Apr 12 18:52:53.166044 ignition[1253]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3525928601", trying btrfs: device or resource busy Apr 12 18:52:53.166044 ignition[1253]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3525928601" Apr 12 18:52:53.172370 ignition[1253]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3525928601" Apr 12 18:52:53.172370 ignition[1253]: INFO : op(c): [started] unmounting "/mnt/oem3525928601" Apr 12 18:52:53.172370 ignition[1253]: INFO : op(c): [finished] unmounting "/mnt/oem3525928601" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(12): [started] processing unit "nvidia.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(12): [finished] processing unit "nvidia.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(13): [started] processing unit "containerd.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(13): op(14): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(13): op(14): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(13): [finished] processing unit "containerd.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:52:53.172370 ignition[1253]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1a): [started] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1a): [finished] setting preset to enabled for "amazon-ssm-agent.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1b): [started] setting preset to enabled for "nvidia.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1b): [finished] setting preset to enabled for "nvidia.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:52:53.213089 ignition[1253]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:52:53.252358 ignition[1253]: INFO : files: createResultFile: createFiles: op(1e): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:52:53.255508 ignition[1253]: INFO : files: createResultFile: createFiles: op(1e): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:52:53.255508 ignition[1253]: INFO : files: files passed Apr 12 18:52:53.255508 ignition[1253]: INFO : Ignition finished successfully Apr 12 18:52:53.261732 systemd[1]: Finished ignition-files.service. Apr 12 18:52:53.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.267918 kernel: audit: type=1130 audit(1712947973.262:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.270155 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:52:53.271550 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:52:53.272432 systemd[1]: Starting ignition-quench.service... Apr 12 18:52:53.280358 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:52:53.280468 systemd[1]: Finished ignition-quench.service. Apr 12 18:52:53.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.293125 kernel: audit: type=1130 audit(1712947973.282:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.293175 kernel: audit: type=1131 audit(1712947973.282:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.294601 initrd-setup-root-after-ignition[1278]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:52:53.297145 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:52:53.304075 kernel: audit: type=1130 audit(1712947973.298:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.304176 systemd[1]: Reached target ignition-complete.target. Apr 12 18:52:53.307150 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:52:53.325055 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:52:53.325153 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:52:53.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.327777 systemd[1]: Reached target initrd-fs.target. Apr 12 18:52:53.330680 systemd[1]: Reached target initrd.target. Apr 12 18:52:53.331715 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:52:53.335472 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:52:53.381792 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:52:53.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.383179 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:52:53.398216 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:52:53.401297 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:52:53.403808 systemd[1]: Stopped target timers.target. Apr 12 18:52:53.405831 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:52:53.407289 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:52:53.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.410399 systemd[1]: Stopped target initrd.target. Apr 12 18:52:53.413555 systemd[1]: Stopped target basic.target. Apr 12 18:52:53.416351 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:52:53.417977 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:52:53.420359 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:52:53.422739 systemd[1]: Stopped target remote-fs.target. Apr 12 18:52:53.425509 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:52:53.428517 systemd[1]: Stopped target sysinit.target. Apr 12 18:52:53.430835 systemd[1]: Stopped target local-fs.target. Apr 12 18:52:53.433729 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:52:53.436511 systemd[1]: Stopped target swap.target. Apr 12 18:52:53.439775 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:52:53.439896 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:52:53.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.446103 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:52:53.448462 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:52:53.449800 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:52:53.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.452611 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:52:53.453986 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:52:53.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.457222 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:52:53.458082 systemd[1]: Stopped ignition-files.service. Apr 12 18:52:53.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.464527 systemd[1]: Stopping ignition-mount.service... Apr 12 18:52:53.485747 ignition[1291]: INFO : Ignition 2.14.0 Apr 12 18:52:53.485747 ignition[1291]: INFO : Stage: umount Apr 12 18:52:53.485747 ignition[1291]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:52:53.485747 ignition[1291]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Apr 12 18:52:53.497183 iscsid[1103]: iscsid shutting down. Apr 12 18:52:53.488322 systemd[1]: Stopping iscsid.service... Apr 12 18:52:53.511384 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:52:53.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.523393 ignition[1291]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Apr 12 18:52:53.523393 ignition[1291]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Apr 12 18:52:53.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.511627 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:52:53.515703 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:52:53.521893 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:52:53.536282 ignition[1291]: INFO : PUT result: OK Apr 12 18:52:53.522203 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:52:53.526843 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:52:53.527175 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:52:53.533300 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:52:53.533627 systemd[1]: Stopped iscsid.service. Apr 12 18:52:53.544481 ignition[1291]: INFO : umount: umount passed Apr 12 18:52:53.544481 ignition[1291]: INFO : Ignition finished successfully Apr 12 18:52:53.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.549961 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:52:53.550174 systemd[1]: Stopped ignition-mount.service. Apr 12 18:52:53.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.555661 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:52:53.555965 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:52:53.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.560839 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:52:53.561016 systemd[1]: Stopped ignition-disks.service. Apr 12 18:52:53.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.564123 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:52:53.564249 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:52:53.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.567279 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:52:53.567398 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:52:53.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.570369 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:52:53.570492 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:52:53.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.573916 systemd[1]: Stopped target paths.target. Apr 12 18:52:53.575629 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:52:53.575775 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:52:53.579074 systemd[1]: Stopped target slices.target. Apr 12 18:52:53.579964 systemd[1]: Stopped target sockets.target. Apr 12 18:52:53.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.580929 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:52:53.580981 systemd[1]: Closed iscsid.socket. Apr 12 18:52:53.583455 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:52:53.584267 systemd[1]: Stopped ignition-setup.service. Apr 12 18:52:53.587579 systemd[1]: Stopping iscsiuio.service... Apr 12 18:52:53.595428 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:52:53.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.596093 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:52:53.596213 systemd[1]: Stopped iscsiuio.service. Apr 12 18:52:53.601268 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:52:53.601365 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:52:53.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.608416 systemd[1]: Stopped target network.target. Apr 12 18:52:53.611196 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:52:53.611247 systemd[1]: Closed iscsiuio.socket. Apr 12 18:52:53.612995 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:52:53.613060 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:52:53.619924 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:52:53.629626 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:52:53.637476 systemd-networkd[1098]: eth0: DHCPv6 lease lost Apr 12 18:52:53.649484 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:52:53.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.649613 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:52:53.653000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:52:53.652248 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:52:53.652281 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:52:53.654735 systemd[1]: Stopping network-cleanup.service... Apr 12 18:52:53.663765 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:52:53.663949 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:52:53.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.674286 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:52:53.674491 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:52:53.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.684710 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:52:53.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.684771 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:52:53.687187 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:52:53.688975 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:52:53.689084 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:52:53.699456 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:52:53.699712 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:52:53.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.705000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:52:53.706208 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:52:53.706282 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:52:53.707755 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:52:53.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.707816 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:52:53.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.710221 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:52:53.711184 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:52:53.712250 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:52:53.712305 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:52:53.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.713506 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:52:53.713556 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:52:53.716957 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:52:53.718707 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:52:53.718786 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:52:53.720607 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:52:53.720760 systemd[1]: Stopped network-cleanup.service. Apr 12 18:52:53.727649 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:52:53.727759 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:52:53.729408 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:52:53.742503 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:52:53.772062 systemd[1]: Switching root. Apr 12 18:52:53.775000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:52:53.775000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:52:53.775000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:52:53.775000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:52:53.775000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:52:53.795430 systemd-journald[184]: Journal stopped Apr 12 18:53:00.445667 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). Apr 12 18:53:00.454126 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:53:00.454164 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:53:00.454191 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:53:00.454209 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:53:00.454228 kernel: SELinux: policy capability open_perms=1 Apr 12 18:53:00.454251 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:53:00.454268 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:53:00.454287 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:53:00.454307 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:53:00.454327 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:53:00.454344 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:53:00.454365 systemd[1]: Successfully loaded SELinux policy in 106.173ms. Apr 12 18:53:00.454404 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.524ms. Apr 12 18:53:00.454427 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:53:00.454447 systemd[1]: Detected virtualization amazon. Apr 12 18:53:00.454466 systemd[1]: Detected architecture x86-64. Apr 12 18:53:00.454485 systemd[1]: Detected first boot. Apr 12 18:53:00.454513 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:53:00.454533 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:53:00.454552 kernel: kauditd_printk_skb: 45 callbacks suppressed Apr 12 18:53:00.454584 kernel: audit: type=1400 audit(1712947975.228:86): avc: denied { associate } for pid=1343 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:53:00.454608 kernel: audit: type=1300 audit(1712947975.228:86): arch=c000003e syscall=188 success=yes exit=0 a0=c0001076c2 a1=c00002cb40 a2=c00002aa40 a3=32 items=0 ppid=1326 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:00.454627 kernel: audit: type=1327 audit(1712947975.228:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:53:00.454648 kernel: audit: type=1400 audit(1712947975.231:87): avc: denied { associate } for pid=1343 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:53:00.454666 kernel: audit: type=1300 audit(1712947975.231:87): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000107799 a2=1ed a3=0 items=2 ppid=1326 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:00.454682 kernel: audit: type=1307 audit(1712947975.231:87): cwd="/" Apr 12 18:53:00.454700 kernel: audit: type=1302 audit(1712947975.231:87): item=0 name=(null) inode=2 dev=00:29 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:00.454716 kernel: audit: type=1302 audit(1712947975.231:87): item=1 name=(null) inode=3 dev=00:29 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:00.454734 kernel: audit: type=1327 audit(1712947975.231:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:53:00.454760 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:53:00.454781 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:00.455340 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:00.455372 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:00.455392 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:53:00.455410 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:53:00.455427 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:53:00.455450 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:53:00.455468 systemd[1]: Created slice system-getty.slice. Apr 12 18:53:00.455489 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:53:00.455508 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:53:00.455529 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:53:00.455547 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:53:00.455565 systemd[1]: Created slice user.slice. Apr 12 18:53:00.455585 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:53:00.455622 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:53:00.455641 systemd[1]: Set up automount boot.automount. Apr 12 18:53:00.455659 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:53:00.455677 systemd[1]: Reached target integritysetup.target. Apr 12 18:53:00.455695 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:53:00.455714 systemd[1]: Reached target remote-fs.target. Apr 12 18:53:00.455739 systemd[1]: Reached target slices.target. Apr 12 18:53:00.455757 systemd[1]: Reached target swap.target. Apr 12 18:53:00.455775 systemd[1]: Reached target torcx.target. Apr 12 18:53:00.455797 systemd[1]: Reached target veritysetup.target. Apr 12 18:53:00.455815 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:53:00.455876 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:53:00.455897 kernel: audit: type=1400 audit(1712947980.187:88): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:53:00.455972 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:53:00.455990 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:53:00.456009 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:53:00.456032 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:53:00.456065 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:53:00.456084 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:53:00.456103 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:53:00.456122 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:53:00.456140 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:53:00.456161 systemd[1]: Mounting media.mount... Apr 12 18:53:00.456186 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:53:00.456204 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:53:00.456221 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:53:00.456239 systemd[1]: Mounting tmp.mount... Apr 12 18:53:00.456257 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:53:00.456274 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:53:00.456294 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:53:00.456314 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:53:00.456335 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:53:00.456360 systemd[1]: Starting modprobe@drm.service... Apr 12 18:53:00.456379 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:53:00.456398 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:53:00.456419 systemd[1]: Starting modprobe@loop.service... Apr 12 18:53:00.456440 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:53:00.456461 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Apr 12 18:53:00.456481 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Apr 12 18:53:00.456504 systemd[1]: Starting systemd-journald.service... Apr 12 18:53:00.456531 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:53:00.456555 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:53:00.456577 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:53:00.456602 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:53:00.456623 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:53:00.456644 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:53:00.456664 kernel: audit: type=1305 audit(1712947980.437:90): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:53:00.456683 kernel: loop: module loaded Apr 12 18:53:00.456704 kernel: audit: type=1300 audit(1712947980.437:90): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffea8149780 a2=4000 a3=7ffea814981c items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:00.456731 systemd-journald[1436]: Journal started Apr 12 18:53:00.456809 systemd-journald[1436]: Runtime Journal (/run/log/journal/ec21670d3113f1a75c5658f25afaf6cf) is 4.8M, max 38.7M, 33.9M free. Apr 12 18:53:00.188000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Apr 12 18:53:00.469030 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:53:00.469126 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:53:00.469154 kernel: audit: type=1327 audit(1712947980.437:90): proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:53:00.437000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:53:00.437000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffea8149780 a2=4000 a3=7ffea814981c items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:00.437000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:53:00.474136 systemd[1]: Started systemd-journald.service. Apr 12 18:53:00.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.477311 systemd[1]: Mounted media.mount. Apr 12 18:53:00.482933 kernel: fuse: init (API version 7.34) Apr 12 18:53:00.483021 kernel: audit: type=1130 audit(1712947980.474:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.484601 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:53:00.486526 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:53:00.488262 systemd[1]: Mounted tmp.mount. Apr 12 18:53:00.489796 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:53:00.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.526962 kernel: audit: type=1130 audit(1712947980.490:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.491795 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:53:00.492055 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:53:00.494638 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:53:00.495386 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:53:00.497731 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:53:00.497980 systemd[1]: Finished modprobe@drm.service. Apr 12 18:53:00.500231 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:53:00.500477 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:53:00.502521 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:53:00.502765 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:53:00.505162 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:53:00.505411 systemd[1]: Finished modprobe@loop.service. Apr 12 18:53:00.508297 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:53:00.512699 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:53:00.517737 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:53:00.528031 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:53:00.558975 kernel: audit: type=1130 audit(1712947980.492:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.559051 kernel: audit: type=1131 audit(1712947980.492:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.539415 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:53:00.544757 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:53:00.549169 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:53:00.551377 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:53:00.555312 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:53:00.558949 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:53:00.564642 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:53:00.566147 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:53:00.568076 systemd[1]: Reached target network-pre.target. Apr 12 18:53:00.591496 kernel: audit: type=1130 audit(1712947980.496:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.591581 kernel: audit: type=1131 audit(1712947980.496:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.573310 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:53:00.582598 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:53:00.616936 kernel: audit: type=1130 audit(1712947980.498:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.617199 systemd-journald[1436]: Time spent on flushing to /var/log/journal/ec21670d3113f1a75c5658f25afaf6cf is 120.748ms for 1143 entries. Apr 12 18:53:00.617199 systemd-journald[1436]: System Journal (/var/log/journal/ec21670d3113f1a75c5658f25afaf6cf) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:53:00.761025 systemd-journald[1436]: Received client request to flush runtime journal. Apr 12 18:53:00.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.606575 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:53:00.608559 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:53:00.665508 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:53:00.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.735965 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:53:00.739469 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:53:00.772108 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:53:00.818301 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:53:00.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:00.822438 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:53:00.876148 udevadm[1490]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:53:01.002005 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:53:01.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:01.005725 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:53:01.123521 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:53:01.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:01.855078 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:53:01.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:01.861500 systemd[1]: Starting systemd-udevd.service... Apr 12 18:53:01.897571 systemd-udevd[1496]: Using default interface naming scheme 'v252'. Apr 12 18:53:01.974352 systemd[1]: Started systemd-udevd.service. Apr 12 18:53:01.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:01.981668 systemd[1]: Starting systemd-networkd.service... Apr 12 18:53:02.027412 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:53:02.093994 (udev-worker)[1504]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:02.132733 systemd[1]: Found device dev-ttyS0.device. Apr 12 18:53:02.137346 systemd[1]: Started systemd-userdbd.service. Apr 12 18:53:02.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:02.239994 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:53:02.251924 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:53:02.277859 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Apr 12 18:53:02.277982 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 18:53:02.275000 audit[1498]: AVC avc: denied { confidentiality } for pid=1498 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:53:02.334797 systemd-networkd[1502]: lo: Link UP Apr 12 18:53:02.334808 systemd-networkd[1502]: lo: Gained carrier Apr 12 18:53:02.335932 systemd-networkd[1502]: Enumeration completed Apr 12 18:53:02.336090 systemd[1]: Started systemd-networkd.service. Apr 12 18:53:02.336485 systemd-networkd[1502]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:53:02.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:02.339794 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:53:02.346005 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:53:02.346747 systemd-networkd[1502]: eth0: Link UP Apr 12 18:53:02.346945 systemd-networkd[1502]: eth0: Gained carrier Apr 12 18:53:02.275000 audit[1498]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560d8fa20980 a1=32194 a2=7f5909b94bc5 a3=5 items=108 ppid=1496 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:02.275000 audit: CWD cwd="/" Apr 12 18:53:02.275000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=1 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=2 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=3 name=(null) inode=15363 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=4 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=5 name=(null) inode=15364 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=6 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.357150 systemd-networkd[1502]: eth0: DHCPv4 address 172.31.16.199/20, gateway 172.31.16.1 acquired from 172.31.16.1 Apr 12 18:53:02.275000 audit: PATH item=7 name=(null) inode=15365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=8 name=(null) inode=15365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=9 name=(null) inode=15366 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=10 name=(null) inode=15365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=11 name=(null) inode=15367 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=12 name=(null) inode=15365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=13 name=(null) inode=15368 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=14 name=(null) inode=15365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=15 name=(null) inode=15369 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=16 name=(null) inode=15365 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=17 name=(null) inode=15370 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=18 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=19 name=(null) inode=15371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.370991 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1509) Apr 12 18:53:02.275000 audit: PATH item=20 name=(null) inode=15371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=21 name=(null) inode=15372 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=22 name=(null) inode=15371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=23 name=(null) inode=15373 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=24 name=(null) inode=15371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=25 name=(null) inode=15374 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=26 name=(null) inode=15371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=27 name=(null) inode=15375 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=28 name=(null) inode=15371 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=29 name=(null) inode=15376 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=30 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=31 name=(null) inode=15377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=32 name=(null) inode=15377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=33 name=(null) inode=15378 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=34 name=(null) inode=15377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=35 name=(null) inode=15379 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=36 name=(null) inode=15377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=37 name=(null) inode=15380 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=38 name=(null) inode=15377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=39 name=(null) inode=15381 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=40 name=(null) inode=15377 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=41 name=(null) inode=15382 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=42 name=(null) inode=15362 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=43 name=(null) inode=15383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=44 name=(null) inode=15383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=45 name=(null) inode=15384 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=46 name=(null) inode=15383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=47 name=(null) inode=15385 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=48 name=(null) inode=15383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=49 name=(null) inode=15386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=50 name=(null) inode=15383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=51 name=(null) inode=15387 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=52 name=(null) inode=15383 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=53 name=(null) inode=15388 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=55 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=56 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=57 name=(null) inode=15390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=58 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=59 name=(null) inode=15391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=60 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=61 name=(null) inode=15392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=62 name=(null) inode=15392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=63 name=(null) inode=15393 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=64 name=(null) inode=15392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=65 name=(null) inode=15394 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=66 name=(null) inode=15392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=67 name=(null) inode=15395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=68 name=(null) inode=15392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=69 name=(null) inode=15396 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=70 name=(null) inode=15392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=71 name=(null) inode=15397 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=72 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=73 name=(null) inode=15398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=74 name=(null) inode=15398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=75 name=(null) inode=15399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=76 name=(null) inode=15398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=77 name=(null) inode=15400 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=78 name=(null) inode=15398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=79 name=(null) inode=15401 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=80 name=(null) inode=15398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=81 name=(null) inode=15402 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=82 name=(null) inode=15398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=83 name=(null) inode=15403 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=84 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=85 name=(null) inode=15404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=86 name=(null) inode=15404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=87 name=(null) inode=15405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=88 name=(null) inode=15404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=89 name=(null) inode=15406 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=90 name=(null) inode=15404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=91 name=(null) inode=15407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=92 name=(null) inode=15404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=93 name=(null) inode=15408 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=94 name=(null) inode=15404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=95 name=(null) inode=15409 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=96 name=(null) inode=15389 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=97 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=98 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=99 name=(null) inode=15411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=100 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=101 name=(null) inode=15412 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=102 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=103 name=(null) inode=15413 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=104 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=105 name=(null) inode=15414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=106 name=(null) inode=15410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PATH item=107 name=(null) inode=15415 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:02.275000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:53:02.410983 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255 Apr 12 18:53:02.415797 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Apr 12 18:53:02.430974 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:53:02.534069 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate). Apr 12 18:53:02.680668 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:53:02.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:02.684225 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:53:02.728724 lvm[1611]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:53:02.758439 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:53:02.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:02.760007 systemd[1]: Reached target cryptsetup.target. Apr 12 18:53:02.763227 systemd[1]: Starting lvm2-activation.service... Apr 12 18:53:02.779449 lvm[1613]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:53:02.820465 systemd[1]: Finished lvm2-activation.service. Apr 12 18:53:02.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:02.821854 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:53:02.823206 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:53:02.823232 systemd[1]: Reached target local-fs.target. Apr 12 18:53:02.824358 systemd[1]: Reached target machines.target. Apr 12 18:53:02.827458 systemd[1]: Starting ldconfig.service... Apr 12 18:53:02.829483 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:53:02.829564 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:53:02.831292 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:53:02.836785 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:53:02.841869 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:53:02.843926 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:53:02.844021 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:53:02.854682 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:53:02.880729 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1617 (bootctl) Apr 12 18:53:02.882661 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:53:02.893393 systemd-tmpfiles[1620]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:53:02.895394 systemd-tmpfiles[1620]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:53:02.897437 systemd-tmpfiles[1620]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:53:02.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:02.910482 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:53:03.105000 systemd-fsck[1626]: fsck.fat 4.2 (2021-01-31) Apr 12 18:53:03.105000 systemd-fsck[1626]: /dev/nvme0n1p1: 789 files, 119240/258078 clusters Apr 12 18:53:03.112142 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:53:03.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.117887 systemd[1]: Mounting boot.mount... Apr 12 18:53:03.147222 systemd[1]: Mounted boot.mount. Apr 12 18:53:03.182886 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:53:03.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.308347 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:53:03.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.315435 systemd[1]: Starting audit-rules.service... Apr 12 18:53:03.320022 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:53:03.325177 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:53:03.331881 systemd[1]: Starting systemd-resolved.service... Apr 12 18:53:03.344640 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:53:03.350336 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:53:03.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.361179 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:53:03.370509 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:53:03.387000 audit[1655]: SYSTEM_BOOT pid=1655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.391545 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:53:03.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.460096 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:53:03.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:03.499000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:53:03.499000 audit[1667]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc0e7dc320 a2=420 a3=0 items=0 ppid=1644 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:03.499000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:53:03.500433 augenrules[1667]: No rules Apr 12 18:53:03.501105 systemd[1]: Finished audit-rules.service. Apr 12 18:53:03.596207 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:53:03.597666 systemd[1]: Reached target time-set.target. Apr 12 18:53:03.603291 systemd-resolved[1650]: Positive Trust Anchors: Apr 12 18:53:03.603580 systemd-resolved[1650]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:53:03.603668 systemd-resolved[1650]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:53:03.610093 systemd-networkd[1502]: eth0: Gained IPv6LL Apr 12 18:53:03.612380 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:53:03.636791 systemd-resolved[1650]: Defaulting to hostname 'linux'. Apr 12 18:53:03.638630 systemd[1]: Started systemd-resolved.service. Apr 12 18:53:03.640041 systemd[1]: Reached target network.target. Apr 12 18:53:03.641063 systemd[1]: Reached target network-online.target. Apr 12 18:53:03.642740 systemd[1]: Reached target nss-lookup.target. Apr 12 18:53:04.383249 systemd-resolved[1650]: Clock change detected. Flushing caches. Apr 12 18:53:04.384201 systemd-timesyncd[1654]: Contacted time server 129.250.35.250:123 (0.flatcar.pool.ntp.org). Apr 12 18:53:04.384286 systemd-timesyncd[1654]: Initial clock synchronization to Fri 2024-04-12 18:53:04.383108 UTC. Apr 12 18:53:04.426307 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:53:04.427473 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:53:04.724911 ldconfig[1615]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:53:04.738667 systemd[1]: Finished ldconfig.service. Apr 12 18:53:04.742039 systemd[1]: Starting systemd-update-done.service... Apr 12 18:53:04.750697 systemd[1]: Finished systemd-update-done.service. Apr 12 18:53:04.752509 systemd[1]: Reached target sysinit.target. Apr 12 18:53:04.754421 systemd[1]: Started motdgen.path. Apr 12 18:53:04.755697 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:53:04.757623 systemd[1]: Started logrotate.timer. Apr 12 18:53:04.758632 systemd[1]: Started mdadm.timer. Apr 12 18:53:04.759468 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:53:04.760478 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:53:04.760531 systemd[1]: Reached target paths.target. Apr 12 18:53:04.761542 systemd[1]: Reached target timers.target. Apr 12 18:53:04.762932 systemd[1]: Listening on dbus.socket. Apr 12 18:53:04.765315 systemd[1]: Starting docker.socket... Apr 12 18:53:04.768593 systemd[1]: Listening on sshd.socket. Apr 12 18:53:04.769862 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:53:04.770883 systemd[1]: Listening on docker.socket. Apr 12 18:53:04.772245 systemd[1]: Reached target sockets.target. Apr 12 18:53:04.773330 systemd[1]: Reached target basic.target. Apr 12 18:53:04.774830 systemd[1]: System is tainted: cgroupsv1 Apr 12 18:53:04.775085 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:53:04.775297 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:53:04.777300 systemd[1]: Started amazon-ssm-agent.service. Apr 12 18:53:04.784967 systemd[1]: Starting containerd.service... Apr 12 18:53:04.789652 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:53:04.796239 systemd[1]: Starting dbus.service... Apr 12 18:53:04.799678 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:53:04.807811 systemd[1]: Starting extend-filesystems.service... Apr 12 18:53:04.809403 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:53:04.811669 systemd[1]: Starting motdgen.service... Apr 12 18:53:04.817903 systemd[1]: Started nvidia.service. Apr 12 18:53:04.822552 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:53:04.828597 systemd[1]: Starting prepare-critools.service... Apr 12 18:53:04.869073 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:53:04.875680 systemd[1]: Starting sshd-keygen.service... Apr 12 18:53:04.909774 systemd[1]: Starting systemd-logind.service... Apr 12 18:53:04.911132 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:53:04.911205 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:53:04.913842 systemd[1]: Starting update-engine.service... Apr 12 18:53:04.918634 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:53:05.001692 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:53:05.075594 jq[1700]: true Apr 12 18:53:05.075777 jq[1686]: false Apr 12 18:53:05.076227 tar[1702]: ./ Apr 12 18:53:05.076227 tar[1702]: ./loopback Apr 12 18:53:05.004359 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:53:05.056433 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:53:05.056841 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:53:05.131877 tar[1703]: crictl Apr 12 18:53:05.173077 jq[1713]: true Apr 12 18:53:05.196056 dbus-daemon[1685]: [system] SELinux support is enabled Apr 12 18:53:05.196288 systemd[1]: Started dbus.service. Apr 12 18:53:05.200689 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:53:05.200733 systemd[1]: Reached target system-config.target. Apr 12 18:53:05.202107 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:53:05.202135 systemd[1]: Reached target user-config.target. Apr 12 18:53:05.225909 dbus-daemon[1685]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1502 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:53:05.229330 dbus-daemon[1685]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:53:05.237956 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:53:05.268197 extend-filesystems[1687]: Found nvme0n1 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p1 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p2 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p3 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found usr Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p4 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p6 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p7 Apr 12 18:53:05.273673 extend-filesystems[1687]: Found nvme0n1p9 Apr 12 18:53:05.273673 extend-filesystems[1687]: Checking size of /dev/nvme0n1p9 Apr 12 18:53:05.346037 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:53:05.346438 systemd[1]: Finished motdgen.service. Apr 12 18:53:05.435254 extend-filesystems[1687]: Resized partition /dev/nvme0n1p9 Apr 12 18:53:05.446036 bash[1754]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:53:05.453899 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:53:05.471538 amazon-ssm-agent[1681]: 2024/04/12 18:53:05 Failed to load instance info from vault. RegistrationKey does not exist. Apr 12 18:53:05.477630 extend-filesystems[1762]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:53:05.480433 amazon-ssm-agent[1681]: Initializing new seelog logger Apr 12 18:53:05.480433 amazon-ssm-agent[1681]: New Seelog Logger Creation Complete Apr 12 18:53:05.480433 amazon-ssm-agent[1681]: 2024/04/12 18:53:05 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:53:05.480433 amazon-ssm-agent[1681]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Apr 12 18:53:05.480433 amazon-ssm-agent[1681]: 2024/04/12 18:53:05 processing appconfig overrides Apr 12 18:53:05.499537 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Apr 12 18:53:05.507388 update_engine[1699]: I0412 18:53:05.506192 1699 main.cc:92] Flatcar Update Engine starting Apr 12 18:53:05.513041 env[1706]: time="2024-04-12T18:53:05.512978715Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:53:05.522138 systemd[1]: Started update-engine.service. Apr 12 18:53:05.523359 update_engine[1699]: I0412 18:53:05.523065 1699 update_check_scheduler.cc:74] Next update check in 2m9s Apr 12 18:53:05.527243 systemd[1]: Started locksmithd.service. Apr 12 18:53:05.571107 tar[1702]: ./bandwidth Apr 12 18:53:05.584834 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Apr 12 18:53:05.620030 systemd[1]: nvidia.service: Deactivated successfully. Apr 12 18:53:05.640949 extend-filesystems[1762]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Apr 12 18:53:05.640949 extend-filesystems[1762]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:53:05.640949 extend-filesystems[1762]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Apr 12 18:53:05.664535 extend-filesystems[1687]: Resized filesystem in /dev/nvme0n1p9 Apr 12 18:53:05.641258 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:53:05.641654 systemd[1]: Finished extend-filesystems.service. Apr 12 18:53:05.691941 systemd-logind[1697]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:53:05.692064 systemd-logind[1697]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 18:53:05.692095 systemd-logind[1697]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:53:05.704682 systemd-logind[1697]: New seat seat0. Apr 12 18:53:05.715679 systemd[1]: Started systemd-logind.service. Apr 12 18:53:05.792382 dbus-daemon[1685]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:53:05.792597 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:53:05.800480 dbus-daemon[1685]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1740 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:53:05.804539 systemd[1]: Starting polkit.service... Apr 12 18:53:05.836189 env[1706]: time="2024-04-12T18:53:05.836138834Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:53:05.836505 env[1706]: time="2024-04-12T18:53:05.836483446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:05.837383 polkitd[1793]: Started polkitd version 121 Apr 12 18:53:05.841226 env[1706]: time="2024-04-12T18:53:05.841173748Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:53:05.846924 env[1706]: time="2024-04-12T18:53:05.846870137Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:05.848088 env[1706]: time="2024-04-12T18:53:05.848036347Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:53:05.849887 env[1706]: time="2024-04-12T18:53:05.849857862Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:05.850045 env[1706]: time="2024-04-12T18:53:05.850017686Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:53:05.850149 env[1706]: time="2024-04-12T18:53:05.850131335Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:05.853109 env[1706]: time="2024-04-12T18:53:05.853081028Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:05.855966 env[1706]: time="2024-04-12T18:53:05.855937870Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:53:05.856508 env[1706]: time="2024-04-12T18:53:05.856462424Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:53:05.860617 env[1706]: time="2024-04-12T18:53:05.860584496Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:53:05.860886 env[1706]: time="2024-04-12T18:53:05.860853453Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:53:05.860995 env[1706]: time="2024-04-12T18:53:05.860976949Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:53:05.867511 polkitd[1793]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:53:05.867609 polkitd[1793]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:53:05.871846 env[1706]: time="2024-04-12T18:53:05.871804564Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:53:05.872026 env[1706]: time="2024-04-12T18:53:05.872004991Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:53:05.872118 env[1706]: time="2024-04-12T18:53:05.872102158Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:53:05.872261 env[1706]: time="2024-04-12T18:53:05.872242286Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872410 env[1706]: time="2024-04-12T18:53:05.872392071Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872526 env[1706]: time="2024-04-12T18:53:05.872499029Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872618 env[1706]: time="2024-04-12T18:53:05.872601460Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872698 env[1706]: time="2024-04-12T18:53:05.872682657Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872773 env[1706]: time="2024-04-12T18:53:05.872758813Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872848 env[1706]: time="2024-04-12T18:53:05.872833113Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.872935 env[1706]: time="2024-04-12T18:53:05.872921022Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.873008 env[1706]: time="2024-04-12T18:53:05.872995178Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:53:05.873207 env[1706]: time="2024-04-12T18:53:05.873187004Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:53:05.873503 env[1706]: time="2024-04-12T18:53:05.873482605Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:53:05.873694 polkitd[1793]: Finished loading, compiling and executing 2 rules Apr 12 18:53:05.874213 env[1706]: time="2024-04-12T18:53:05.874188548Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:53:05.874346 env[1706]: time="2024-04-12T18:53:05.874327395Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.874496 env[1706]: time="2024-04-12T18:53:05.874478537Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:53:05.874658 env[1706]: time="2024-04-12T18:53:05.874637954Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.874741 env[1706]: time="2024-04-12T18:53:05.874725836Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.874816 env[1706]: time="2024-04-12T18:53:05.874801528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.874906 env[1706]: time="2024-04-12T18:53:05.874891631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.874995 env[1706]: time="2024-04-12T18:53:05.874980124Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875070 env[1706]: time="2024-04-12T18:53:05.875056548Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875147 env[1706]: time="2024-04-12T18:53:05.875132752Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875219 env[1706]: time="2024-04-12T18:53:05.875205495Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875304 env[1706]: time="2024-04-12T18:53:05.875290804Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:53:05.875545 env[1706]: time="2024-04-12T18:53:05.875504126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875644 env[1706]: time="2024-04-12T18:53:05.875628115Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875728 env[1706]: time="2024-04-12T18:53:05.875712715Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.875805 env[1706]: time="2024-04-12T18:53:05.875789696Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:53:05.875887 env[1706]: time="2024-04-12T18:53:05.875869774Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:53:05.875959 env[1706]: time="2024-04-12T18:53:05.875944782Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:53:05.876050 env[1706]: time="2024-04-12T18:53:05.876035082Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:53:05.876148 env[1706]: time="2024-04-12T18:53:05.876133250Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:53:05.876676 env[1706]: time="2024-04-12T18:53:05.876507939Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:53:05.879282 env[1706]: time="2024-04-12T18:53:05.876834742Z" level=info msg="Connect containerd service" Apr 12 18:53:05.879282 env[1706]: time="2024-04-12T18:53:05.876905381Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:53:05.877266 systemd[1]: Started polkit.service. Apr 12 18:53:05.876946 dbus-daemon[1685]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:53:05.882903 polkitd[1793]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:53:05.919248 systemd-hostnamed[1740]: Hostname set to (transient) Apr 12 18:53:05.919374 systemd-resolved[1650]: System hostname changed to 'ip-172-31-16-199'. Apr 12 18:53:05.929465 env[1706]: time="2024-04-12T18:53:05.929406457Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:53:05.934904 env[1706]: time="2024-04-12T18:53:05.934859829Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:53:05.935181 env[1706]: time="2024-04-12T18:53:05.935158724Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:53:05.935362 env[1706]: time="2024-04-12T18:53:05.935344865Z" level=info msg="containerd successfully booted in 0.438212s" Apr 12 18:53:05.935465 systemd[1]: Started containerd.service. Apr 12 18:53:05.943914 tar[1702]: ./ptp Apr 12 18:53:05.959776 env[1706]: time="2024-04-12T18:53:05.959706302Z" level=info msg="Start subscribing containerd event" Apr 12 18:53:05.962304 env[1706]: time="2024-04-12T18:53:05.961850776Z" level=info msg="Start recovering state" Apr 12 18:53:05.962500 env[1706]: time="2024-04-12T18:53:05.962319763Z" level=info msg="Start event monitor" Apr 12 18:53:05.962500 env[1706]: time="2024-04-12T18:53:05.962350185Z" level=info msg="Start snapshots syncer" Apr 12 18:53:05.962500 env[1706]: time="2024-04-12T18:53:05.962493908Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:53:05.963157 env[1706]: time="2024-04-12T18:53:05.962509932Z" level=info msg="Start streaming server" Apr 12 18:53:06.095895 coreos-metadata[1684]: Apr 12 18:53:06.095 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:53:06.098801 coreos-metadata[1684]: Apr 12 18:53:06.098 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Apr 12 18:53:06.100121 coreos-metadata[1684]: Apr 12 18:53:06.100 INFO Fetch successful Apr 12 18:53:06.100249 coreos-metadata[1684]: Apr 12 18:53:06.100 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Apr 12 18:53:06.101061 coreos-metadata[1684]: Apr 12 18:53:06.100 INFO Fetch successful Apr 12 18:53:06.103737 unknown[1684]: wrote ssh authorized keys file for user: core Apr 12 18:53:06.126395 update-ssh-keys[1838]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:53:06.127151 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:53:06.190149 tar[1702]: ./vlan Apr 12 18:53:06.269301 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Create new startup processor Apr 12 18:53:06.269750 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [LongRunningPluginsManager] registered plugins: {} Apr 12 18:53:06.269863 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing bookkeeping folders Apr 12 18:53:06.269941 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO removing the completed state files Apr 12 18:53:06.270039 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing bookkeeping folders for long running plugins Apr 12 18:53:06.270119 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Apr 12 18:53:06.270194 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing healthcheck folders for long running plugins Apr 12 18:53:06.270268 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing locations for inventory plugin Apr 12 18:53:06.270359 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing default location for custom inventory Apr 12 18:53:06.270439 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing default location for file inventory Apr 12 18:53:06.270533 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Initializing default location for role inventory Apr 12 18:53:06.270602 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Init the cloudwatchlogs publisher Apr 12 18:53:06.270678 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:configureDocker Apr 12 18:53:06.270762 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:runDockerAction Apr 12 18:53:06.270859 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:runPowerShellScript Apr 12 18:53:06.270954 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:updateSsmAgent Apr 12 18:53:06.271029 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:refreshAssociation Apr 12 18:53:06.271106 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:configurePackage Apr 12 18:53:06.271185 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:downloadContent Apr 12 18:53:06.271261 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:runDocument Apr 12 18:53:06.271347 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform independent plugin aws:softwareInventory Apr 12 18:53:06.271425 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Successfully loaded platform dependent plugin aws:runShellScript Apr 12 18:53:06.271500 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Apr 12 18:53:06.271591 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO OS: linux, Arch: amd64 Apr 12 18:53:06.272499 amazon-ssm-agent[1681]: datastore file /var/lib/amazon/ssm/i-06845ebbbd3af8789/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Apr 12 18:53:06.286400 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] Starting document processing engine... Apr 12 18:53:06.350447 tar[1702]: ./host-device Apr 12 18:53:06.385794 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [EngineProcessor] Starting Apr 12 18:53:06.479444 tar[1702]: ./tuning Apr 12 18:53:06.480104 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Apr 12 18:53:06.574654 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] Starting message polling Apr 12 18:53:06.589687 tar[1702]: ./vrf Apr 12 18:53:06.669449 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] Starting send replies to MDS Apr 12 18:53:06.684645 tar[1702]: ./sbr Apr 12 18:53:06.766106 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [instanceID=i-06845ebbbd3af8789] Starting association polling Apr 12 18:53:06.810575 tar[1702]: ./tap Apr 12 18:53:06.860053 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Apr 12 18:53:06.928987 tar[1702]: ./dhcp Apr 12 18:53:06.955371 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [Association] Launching response handler Apr 12 18:53:07.050987 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Apr 12 18:53:07.146611 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Apr 12 18:53:07.152141 tar[1702]: ./static Apr 12 18:53:07.203164 tar[1702]: ./firewall Apr 12 18:53:07.226732 systemd[1]: Finished prepare-critools.service. Apr 12 18:53:07.242768 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Apr 12 18:53:07.282791 tar[1702]: ./macvlan Apr 12 18:53:07.337071 tar[1702]: ./dummy Apr 12 18:53:07.338863 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [OfflineService] Starting document processing engine... Apr 12 18:53:07.389318 tar[1702]: ./bridge Apr 12 18:53:07.435140 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [OfflineService] [EngineProcessor] Starting Apr 12 18:53:07.446963 tar[1702]: ./ipvlan Apr 12 18:53:07.503877 tar[1702]: ./portmap Apr 12 18:53:07.531604 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [OfflineService] [EngineProcessor] Initial processing Apr 12 18:53:07.555198 tar[1702]: ./host-local Apr 12 18:53:07.623155 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:53:07.628313 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [OfflineService] Starting message polling Apr 12 18:53:07.640559 locksmithd[1772]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:53:07.725183 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [OfflineService] Starting send replies to MDS Apr 12 18:53:07.822634 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [LongRunningPluginsManager] starting long running plugin manager Apr 12 18:53:07.919718 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Apr 12 18:53:08.017138 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:53:08.114872 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] Starting session document processing engine... Apr 12 18:53:08.216825 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] [EngineProcessor] Starting Apr 12 18:53:08.314542 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Apr 12 18:53:08.412790 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-06845ebbbd3af8789, requestId: 9563095e-e104-4e5b-9db1-c51e96b78d36 Apr 12 18:53:08.488933 sshd_keygen[1735]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:53:08.511144 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Apr 12 18:53:08.518317 systemd[1]: Finished sshd-keygen.service. Apr 12 18:53:08.522289 systemd[1]: Starting issuegen.service... Apr 12 18:53:08.531147 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:53:08.531373 systemd[1]: Finished issuegen.service. Apr 12 18:53:08.535211 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:53:08.545699 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:53:08.551340 systemd[1]: Started getty@tty1.service. Apr 12 18:53:08.554866 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:53:08.556493 systemd[1]: Reached target getty.target. Apr 12 18:53:08.558450 systemd[1]: Reached target multi-user.target. Apr 12 18:53:08.561745 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:53:08.578870 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:53:08.579347 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:53:08.588460 systemd[1]: Startup finished in 9.742s (kernel) + 13.242s (userspace) = 22.985s. Apr 12 18:53:08.609873 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] listening reply. Apr 12 18:53:08.708714 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [StartupProcessor] Executing startup processor tasks Apr 12 18:53:08.808198 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Apr 12 18:53:08.907544 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Apr 12 18:53:09.007007 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.3 Apr 12 18:53:09.106724 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-06845ebbbd3af8789?role=subscribe&stream=input Apr 12 18:53:09.206494 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-06845ebbbd3af8789?role=subscribe&stream=input Apr 12 18:53:09.306533 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] Starting receiving message from control channel Apr 12 18:53:09.406951 amazon-ssm-agent[1681]: 2024-04-12 18:53:06 INFO [MessageGatewayService] [EngineProcessor] Initial processing Apr 12 18:53:14.047130 systemd[1]: Created slice system-sshd.slice. Apr 12 18:53:14.049377 systemd[1]: Started sshd@0-172.31.16.199:22-147.75.109.163:43890.service. Apr 12 18:53:14.274971 sshd[1921]: Accepted publickey for core from 147.75.109.163 port 43890 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:14.278260 sshd[1921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:14.298922 systemd[1]: Created slice user-500.slice. Apr 12 18:53:14.301755 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:53:14.307558 systemd-logind[1697]: New session 1 of user core. Apr 12 18:53:14.327992 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:53:14.329944 systemd[1]: Starting user@500.service... Apr 12 18:53:14.343020 (systemd)[1926]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:14.454291 systemd[1926]: Queued start job for default target default.target. Apr 12 18:53:14.454702 systemd[1926]: Reached target paths.target. Apr 12 18:53:14.454728 systemd[1926]: Reached target sockets.target. Apr 12 18:53:14.454747 systemd[1926]: Reached target timers.target. Apr 12 18:53:14.454764 systemd[1926]: Reached target basic.target. Apr 12 18:53:14.455051 systemd[1]: Started user@500.service. Apr 12 18:53:14.456389 systemd[1]: Started session-1.scope. Apr 12 18:53:14.456880 systemd[1926]: Reached target default.target. Apr 12 18:53:14.457132 systemd[1926]: Startup finished in 97ms. Apr 12 18:53:14.613669 systemd[1]: Started sshd@1-172.31.16.199:22-147.75.109.163:43906.service. Apr 12 18:53:14.796917 sshd[1935]: Accepted publickey for core from 147.75.109.163 port 43906 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:14.798615 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:14.806323 systemd-logind[1697]: New session 2 of user core. Apr 12 18:53:14.806932 systemd[1]: Started session-2.scope. Apr 12 18:53:14.950633 sshd[1935]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:14.955136 systemd[1]: sshd@1-172.31.16.199:22-147.75.109.163:43906.service: Deactivated successfully. Apr 12 18:53:14.957221 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:53:14.958188 systemd-logind[1697]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:53:14.960009 systemd-logind[1697]: Removed session 2. Apr 12 18:53:14.976286 systemd[1]: Started sshd@2-172.31.16.199:22-147.75.109.163:43922.service. Apr 12 18:53:15.146180 sshd[1942]: Accepted publickey for core from 147.75.109.163 port 43922 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:15.147746 sshd[1942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:15.156925 systemd-logind[1697]: New session 3 of user core. Apr 12 18:53:15.157602 systemd[1]: Started session-3.scope. Apr 12 18:53:15.294205 sshd[1942]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:15.301489 systemd[1]: sshd@2-172.31.16.199:22-147.75.109.163:43922.service: Deactivated successfully. Apr 12 18:53:15.303121 systemd-logind[1697]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:53:15.303222 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:53:15.306078 systemd-logind[1697]: Removed session 3. Apr 12 18:53:15.327828 systemd[1]: Started sshd@3-172.31.16.199:22-147.75.109.163:43936.service. Apr 12 18:53:15.497415 sshd[1949]: Accepted publickey for core from 147.75.109.163 port 43936 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:15.499194 sshd[1949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:15.507215 systemd[1]: Started session-4.scope. Apr 12 18:53:15.507583 systemd-logind[1697]: New session 4 of user core. Apr 12 18:53:15.669632 sshd[1949]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:15.681488 systemd-logind[1697]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:53:15.681716 systemd[1]: sshd@3-172.31.16.199:22-147.75.109.163:43936.service: Deactivated successfully. Apr 12 18:53:15.683305 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:53:15.683957 systemd-logind[1697]: Removed session 4. Apr 12 18:53:15.693688 systemd[1]: Started sshd@4-172.31.16.199:22-147.75.109.163:43938.service. Apr 12 18:53:15.862784 sshd[1956]: Accepted publickey for core from 147.75.109.163 port 43938 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:15.864511 sshd[1956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:15.873160 systemd[1]: Started session-5.scope. Apr 12 18:53:15.873568 systemd-logind[1697]: New session 5 of user core. Apr 12 18:53:16.009408 sudo[1960]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:53:16.009732 sudo[1960]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:16.019810 dbus-daemon[1685]: \xd0}ߧnU: received setenforce notice (enforcing=-1876295728) Apr 12 18:53:16.022512 sudo[1960]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:16.046495 sshd[1956]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:16.053394 systemd[1]: sshd@4-172.31.16.199:22-147.75.109.163:43938.service: Deactivated successfully. Apr 12 18:53:16.055601 systemd-logind[1697]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:53:16.055678 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:53:16.059699 systemd-logind[1697]: Removed session 5. Apr 12 18:53:16.070969 systemd[1]: Started sshd@5-172.31.16.199:22-147.75.109.163:43946.service. Apr 12 18:53:16.239400 sshd[1964]: Accepted publickey for core from 147.75.109.163 port 43946 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:16.241038 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:16.246998 systemd-logind[1697]: New session 6 of user core. Apr 12 18:53:16.247628 systemd[1]: Started session-6.scope. Apr 12 18:53:16.354454 sudo[1969]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:53:16.355815 sudo[1969]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:16.361052 sudo[1969]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:16.373848 sudo[1968]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:53:16.374339 sudo[1968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:16.418395 systemd[1]: Stopping audit-rules.service... Apr 12 18:53:16.421000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:53:16.423661 auditctl[1972]: No rules Apr 12 18:53:16.430547 kernel: kauditd_printk_skb: 147 callbacks suppressed Apr 12 18:53:16.430658 kernel: audit: type=1305 audit(1712947996.421:132): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:53:16.426885 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:53:16.427209 systemd[1]: Stopped audit-rules.service. Apr 12 18:53:16.438505 systemd[1]: Starting audit-rules.service... Apr 12 18:53:16.421000 audit[1972]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed05aa5b0 a2=420 a3=0 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:16.463552 kernel: audit: type=1300 audit(1712947996.421:132): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed05aa5b0 a2=420 a3=0 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:16.421000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:53:16.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.485177 kernel: audit: type=1327 audit(1712947996.421:132): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:53:16.485270 kernel: audit: type=1131 audit(1712947996.426:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.495255 augenrules[1990]: No rules Apr 12 18:53:16.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.496179 systemd[1]: Finished audit-rules.service. Apr 12 18:53:16.497635 sudo[1968]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:16.505192 kernel: audit: type=1130 audit(1712947996.495:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.505276 kernel: audit: type=1106 audit(1712947996.497:135): pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.497000 audit[1968]: USER_END pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.497000 audit[1968]: CRED_DISP pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.517377 kernel: audit: type=1104 audit(1712947996.497:136): pid=1968 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.519705 sshd[1964]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:16.521000 audit[1964]: USER_END pid=1964 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.530640 systemd[1]: sshd@5-172.31.16.199:22-147.75.109.163:43946.service: Deactivated successfully. Apr 12 18:53:16.532246 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:53:16.545934 kernel: audit: type=1106 audit(1712947996.521:137): pid=1964 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.544662 systemd-logind[1697]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:53:16.549565 systemd[1]: Started sshd@6-172.31.16.199:22-147.75.109.163:43952.service. Apr 12 18:53:16.521000 audit[1964]: CRED_DISP pid=1964 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.551913 systemd-logind[1697]: Removed session 6. Apr 12 18:53:16.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.199:22-147.75.109.163:43946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.563121 kernel: audit: type=1104 audit(1712947996.521:138): pid=1964 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.563210 kernel: audit: type=1131 audit(1712947996.530:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.199:22-147.75.109.163:43946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.199:22-147.75.109.163:43952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.720000 audit[1997]: USER_ACCT pid=1997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.721000 audit[1997]: CRED_ACQ pid=1997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.721000 audit[1997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a9b20f0 a2=3 a3=0 items=0 ppid=1 pid=1997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:16.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:53:16.722471 sshd[1997]: Accepted publickey for core from 147.75.109.163 port 43952 ssh2: RSA SHA256:+N1xisw2c2FaZUjSYyTG/z1AiN+MoHtibeEcHRhPKVY Apr 12 18:53:16.722478 sshd[1997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:16.728821 systemd[1]: Started session-7.scope. Apr 12 18:53:16.729098 systemd-logind[1697]: New session 7 of user core. Apr 12 18:53:16.734000 audit[1997]: USER_START pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.736000 audit[2000]: CRED_ACQ pid=2000 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:16.832000 audit[2001]: USER_ACCT pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.832000 audit[2001]: CRED_REFR pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.833362 sudo[2001]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:53:16.833693 sudo[2001]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:16.838000 audit[2001]: USER_START pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:17.619449 systemd[1]: Reloading. Apr 12 18:53:17.752599 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-04-12T18:53:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:17.752638 /usr/lib/systemd/system-generators/torcx-generator[2031]: time="2024-04-12T18:53:17Z" level=info msg="torcx already run" Apr 12 18:53:17.896918 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:17.896945 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:17.921110 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:18.040370 systemd[1]: Started kubelet.service. Apr 12 18:53:18.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.059150 systemd[1]: Starting coreos-metadata.service... Apr 12 18:53:18.195561 kubelet[2089]: E0412 18:53:18.194820 2089 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:53:18.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:18.198696 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:18.198929 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:18.248931 coreos-metadata[2097]: Apr 12 18:53:18.248 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Apr 12 18:53:18.250150 coreos-metadata[2097]: Apr 12 18:53:18.250 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 Apr 12 18:53:18.250953 coreos-metadata[2097]: Apr 12 18:53:18.250 INFO Fetch successful Apr 12 18:53:18.251037 coreos-metadata[2097]: Apr 12 18:53:18.250 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 Apr 12 18:53:18.251411 coreos-metadata[2097]: Apr 12 18:53:18.251 INFO Fetch successful Apr 12 18:53:18.251550 coreos-metadata[2097]: Apr 12 18:53:18.251 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 Apr 12 18:53:18.251925 coreos-metadata[2097]: Apr 12 18:53:18.251 INFO Fetch successful Apr 12 18:53:18.252026 coreos-metadata[2097]: Apr 12 18:53:18.252 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 Apr 12 18:53:18.252415 coreos-metadata[2097]: Apr 12 18:53:18.252 INFO Fetch successful Apr 12 18:53:18.252606 coreos-metadata[2097]: Apr 12 18:53:18.252 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 Apr 12 18:53:18.253079 coreos-metadata[2097]: Apr 12 18:53:18.253 INFO Fetch successful Apr 12 18:53:18.253181 coreos-metadata[2097]: Apr 12 18:53:18.253 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 Apr 12 18:53:18.253618 coreos-metadata[2097]: Apr 12 18:53:18.253 INFO Fetch successful Apr 12 18:53:18.253768 coreos-metadata[2097]: Apr 12 18:53:18.253 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 Apr 12 18:53:18.254235 coreos-metadata[2097]: Apr 12 18:53:18.254 INFO Fetch successful Apr 12 18:53:18.254310 coreos-metadata[2097]: Apr 12 18:53:18.254 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 Apr 12 18:53:18.254764 coreos-metadata[2097]: Apr 12 18:53:18.254 INFO Fetch successful Apr 12 18:53:18.266533 systemd[1]: Finished coreos-metadata.service. Apr 12 18:53:18.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.921122 systemd[1]: Stopped kubelet.service. Apr 12 18:53:18.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:18.947678 systemd[1]: Reloading. Apr 12 18:53:19.063581 /usr/lib/systemd/system-generators/torcx-generator[2159]: time="2024-04-12T18:53:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:19.064101 /usr/lib/systemd/system-generators/torcx-generator[2159]: time="2024-04-12T18:53:19Z" level=info msg="torcx already run" Apr 12 18:53:19.212858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:19.212882 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:19.237189 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:19.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:19.421605 systemd[1]: Started kubelet.service. Apr 12 18:53:19.483443 kubelet[2217]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:19.483958 kubelet[2217]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:19.484003 kubelet[2217]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:19.484120 kubelet[2217]: I0412 18:53:19.484096 2217 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:19.732045 kubelet[2217]: I0412 18:53:19.732010 2217 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:53:19.732045 kubelet[2217]: I0412 18:53:19.732040 2217 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:19.732401 kubelet[2217]: I0412 18:53:19.732378 2217 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:53:19.734964 kubelet[2217]: I0412 18:53:19.734884 2217 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:19.738170 kubelet[2217]: I0412 18:53:19.738145 2217 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:19.738603 kubelet[2217]: I0412 18:53:19.738583 2217 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:19.738712 kubelet[2217]: I0412 18:53:19.738696 2217 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:53:19.738868 kubelet[2217]: I0412 18:53:19.738723 2217 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:53:19.738868 kubelet[2217]: I0412 18:53:19.738739 2217 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:53:19.738868 kubelet[2217]: I0412 18:53:19.738864 2217 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:19.744071 kubelet[2217]: I0412 18:53:19.744039 2217 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:53:19.744071 kubelet[2217]: I0412 18:53:19.744069 2217 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:19.744233 kubelet[2217]: I0412 18:53:19.744093 2217 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:53:19.744233 kubelet[2217]: I0412 18:53:19.744110 2217 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:19.744631 kubelet[2217]: E0412 18:53:19.744616 2217 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:19.744776 kubelet[2217]: E0412 18:53:19.744764 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:19.745167 kubelet[2217]: I0412 18:53:19.745146 2217 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:19.745612 kubelet[2217]: W0412 18:53:19.745584 2217 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:53:19.746080 kubelet[2217]: I0412 18:53:19.746063 2217 server.go:1168] "Started kubelet" Apr 12 18:53:19.746264 kubelet[2217]: I0412 18:53:19.746252 2217 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:19.747285 kubelet[2217]: I0412 18:53:19.747270 2217 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:19.747932 kubelet[2217]: E0412 18:53:19.747910 2217 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:53:19.748004 kubelet[2217]: E0412 18:53:19.747944 2217 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:19.749328 kubelet[2217]: I0412 18:53:19.746307 2217 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:53:19.751000 audit[2217]: AVC avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:19.751000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:19.751000 audit[2217]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009c15c0 a1=c000849248 a2=c0009c1590 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.751000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:19.751000 audit[2217]: AVC avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:19.751000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:19.751000 audit[2217]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b90a80 a1=c000849260 a2=c0009c1650 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.751000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:19.752067 kubelet[2217]: I0412 18:53:19.751602 2217 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:19.752067 kubelet[2217]: I0412 18:53:19.751651 2217 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:19.752067 kubelet[2217]: I0412 18:53:19.751739 2217 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:19.754195 kubelet[2217]: I0412 18:53:19.753577 2217 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:53:19.754195 kubelet[2217]: I0412 18:53:19.753748 2217 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:53:19.793668 kubelet[2217]: W0412 18:53:19.793641 2217 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.16.199" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:53:19.793823 kubelet[2217]: E0412 18:53:19.793681 2217 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.16.199" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Apr 12 18:53:19.793823 kubelet[2217]: W0412 18:53:19.793721 2217 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:53:19.793823 kubelet[2217]: E0412 18:53:19.793733 2217 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Apr 12 18:53:19.793968 kubelet[2217]: E0412 18:53:19.793759 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d2153942a2c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 746042412, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 746042412, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.794303 kubelet[2217]: W0412 18:53:19.794162 2217 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:53:19.794303 kubelet[2217]: E0412 18:53:19.794187 2217 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Apr 12 18:53:19.794303 kubelet[2217]: E0412 18:53:19.794279 2217 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.16.199\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Apr 12 18:53:19.805642 kubelet[2217]: E0412 18:53:19.805507 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d2153b0fc94", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 747931284, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 747931284, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.856855 kubelet[2217]: I0412 18:53:19.856827 2217 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.199" Apr 12 18:53:19.865018 kubelet[2217]: E0412 18:53:19.858709 2217 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.16.199" Apr 12 18:53:19.865018 kubelet[2217]: E0412 18:53:19.858895 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2ddaf5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.199 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856777973, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856777973, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.865305 kubelet[2217]: E0412 18:53:19.861455 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2df4e2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.199 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856784610, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856784610, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.865854 kubelet[2217]: E0412 18:53:19.865752 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2e0587", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.199 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856788871, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856788871, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.870221 kubelet[2217]: I0412 18:53:19.868939 2217 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:19.870221 kubelet[2217]: I0412 18:53:19.868959 2217 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:19.870221 kubelet[2217]: I0412 18:53:19.868979 2217 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:19.871075 kubelet[2217]: E0412 18:53:19.870882 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2ddaf5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.199 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856777973, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 867425262, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2ddaf5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.872800 kubelet[2217]: I0412 18:53:19.872780 2217 policy_none.go:49] "None policy: Start" Apr 12 18:53:19.874469 kubelet[2217]: I0412 18:53:19.874453 2217 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:53:19.874734 kubelet[2217]: I0412 18:53:19.874722 2217 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:19.875828 kubelet[2217]: E0412 18:53:19.875750 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2df4e2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.199 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856784610, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 867430996, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2df4e2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.875000 audit[2231]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:19.875000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffa87172e0 a2=0 a3=7fffa87172cc items=0 ppid=2217 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:19.876000 audit[2235]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:19.876000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc6e5c71e0 a2=0 a3=7ffc6e5c71cc items=0 ppid=2217 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:19.889852 kubelet[2217]: E0412 18:53:19.889671 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2e0587", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.199 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856788871, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 867434769, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2e0587" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.899033 kubelet[2217]: I0412 18:53:19.898998 2217 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:19.898000 audit[2217]: AVC avc: denied { mac_admin } for pid=2217 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:19.898000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:19.898000 audit[2217]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011180f0 a1=c00106a8d0 a2=c0011180c0 a3=25 items=0 ppid=1 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.899596 kubelet[2217]: I0412 18:53:19.899577 2217 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:19.898000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:19.900312 kubelet[2217]: I0412 18:53:19.900302 2217 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:19.879000 audit[2237]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:19.879000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa81397b0 a2=0 a3=7fffa813979c items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:19.904590 kubelet[2217]: E0412 18:53:19.904450 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215ce3098b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 902206347, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 902206347, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:19.904740 kubelet[2217]: E0412 18:53:19.904717 2217 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.16.199\" not found" Apr 12 18:53:19.907000 audit[2243]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:19.907000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff913f8fb0 a2=0 a3=7fff913f8f9c items=0 ppid=2217 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:19.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:20.002626 kubelet[2217]: E0412 18:53:19.997752 2217 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.16.199\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Apr 12 18:53:20.023000 audit[2248]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:20.023000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffed2fee860 a2=0 a3=7ffed2fee84c items=0 ppid=2217 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:53:20.026960 kubelet[2217]: I0412 18:53:20.026918 2217 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:53:20.028000 audit[2249]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:20.028000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd47207980 a2=0 a3=7ffd4720796c items=0 ppid=2217 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:20.029139 kubelet[2217]: I0412 18:53:20.029106 2217 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:53:20.029204 kubelet[2217]: I0412 18:53:20.029140 2217 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:53:20.029204 kubelet[2217]: I0412 18:53:20.029167 2217 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:53:20.029336 kubelet[2217]: E0412 18:53:20.029220 2217 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Apr 12 18:53:20.030000 audit[2250]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:20.030000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffed1172c0 a2=0 a3=7fffed1172ac items=0 ppid=2217 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:20.033192 kubelet[2217]: W0412 18:53:20.033161 2217 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:53:20.033374 kubelet[2217]: E0412 18:53:20.033203 2217 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Apr 12 18:53:20.033000 audit[2251]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:20.033000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca3cfb7a0 a2=0 a3=7ffca3cfb78c items=0 ppid=2217 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:20.033000 audit[2252]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:20.033000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc01340670 a2=0 a3=7ffc0134065c items=0 ppid=2217 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:20.035000 audit[2253]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:20.035000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3c09e430 a2=0 a3=7ffe3c09e41c items=0 ppid=2217 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:20.035000 audit[2254]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:20.035000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc4bccd760 a2=0 a3=7ffc4bccd74c items=0 ppid=2217 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:20.037000 audit[2255]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:20.037000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd27ca2d0 a2=0 a3=7fffd27ca2bc items=0 ppid=2217 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:20.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:20.061498 kubelet[2217]: I0412 18:53:20.061391 2217 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.199" Apr 12 18:53:20.064896 kubelet[2217]: E0412 18:53:20.064869 2217 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.16.199" Apr 12 18:53:20.065037 kubelet[2217]: E0412 18:53:20.064862 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2ddaf5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.199 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856777973, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 20, 61244429, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2ddaf5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:20.066806 kubelet[2217]: E0412 18:53:20.066697 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2df4e2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.199 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856784610, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 20, 61257266, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2df4e2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:20.068637 kubelet[2217]: E0412 18:53:20.068470 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2e0587", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.199 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856788871, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 20, 61261638, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2e0587" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:20.405966 kubelet[2217]: E0412 18:53:20.405804 2217 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.16.199\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Apr 12 18:53:20.466305 kubelet[2217]: I0412 18:53:20.466267 2217 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.199" Apr 12 18:53:20.468444 kubelet[2217]: E0412 18:53:20.468352 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2ddaf5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.16.199 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856777973, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 20, 466218085, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2ddaf5" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:20.484952 kubelet[2217]: E0412 18:53:20.484920 2217 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.16.199" Apr 12 18:53:20.486795 kubelet[2217]: E0412 18:53:20.484915 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2df4e2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.16.199 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856784610, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 20, 466230697, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2df4e2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:20.487878 kubelet[2217]: E0412 18:53:20.487789 2217 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199.17c59d215a2e0587", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.16.199", UID:"172.31.16.199", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.16.199 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.16.199"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 53, 19, 856788871, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 53, 20, 466235655, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.31.16.199.17c59d215a2e0587" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Apr 12 18:53:20.734045 kubelet[2217]: I0412 18:53:20.733893 2217 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Apr 12 18:53:20.745290 kubelet[2217]: E0412 18:53:20.745245 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:21.208772 kubelet[2217]: E0412 18:53:21.208654 2217 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.16.199" not found Apr 12 18:53:21.218694 kubelet[2217]: E0412 18:53:21.218655 2217 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.16.199\" not found" node="172.31.16.199" Apr 12 18:53:21.286202 kubelet[2217]: I0412 18:53:21.286172 2217 kubelet_node_status.go:70] "Attempting to register node" node="172.31.16.199" Apr 12 18:53:21.292743 kubelet[2217]: I0412 18:53:21.292711 2217 kubelet_node_status.go:73] "Successfully registered node" node="172.31.16.199" Apr 12 18:53:21.403493 kubelet[2217]: I0412 18:53:21.403465 2217 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Apr 12 18:53:21.403945 env[1706]: time="2024-04-12T18:53:21.403900043Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:53:21.404379 kubelet[2217]: I0412 18:53:21.404107 2217 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Apr 12 18:53:21.457727 sudo[2001]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:21.461790 kernel: kauditd_printk_skb: 65 callbacks suppressed Apr 12 18:53:21.461839 kernel: audit: type=1106 audit(1712948001.457:170): pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:21.457000 audit[2001]: USER_END pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:21.457000 audit[2001]: CRED_DISP pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:21.469558 kernel: audit: type=1104 audit(1712948001.457:171): pid=2001 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:21.480687 sshd[1997]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:21.481000 audit[1997]: USER_END pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:21.484553 systemd[1]: sshd@6-172.31.16.199:22-147.75.109.163:43952.service: Deactivated successfully. Apr 12 18:53:21.486252 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:53:21.501715 kernel: audit: type=1106 audit(1712948001.481:172): pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:21.501861 kernel: audit: type=1104 audit(1712948001.481:173): pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:21.481000 audit[1997]: CRED_DISP pid=1997 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 18:53:21.497258 systemd-logind[1697]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:53:21.501504 systemd-logind[1697]: Removed session 7. Apr 12 18:53:21.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.199:22-147.75.109.163:43952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:21.502546 kernel: audit: type=1131 audit(1712948001.482:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.199:22-147.75.109.163:43952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:21.746123 kubelet[2217]: E0412 18:53:21.746015 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:21.746874 kubelet[2217]: I0412 18:53:21.746022 2217 apiserver.go:52] "Watching apiserver" Apr 12 18:53:21.749912 kubelet[2217]: I0412 18:53:21.749837 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:53:21.750031 kubelet[2217]: I0412 18:53:21.749986 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:53:21.750081 kubelet[2217]: I0412 18:53:21.750042 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:53:21.755113 kubelet[2217]: I0412 18:53:21.755060 2217 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:53:21.758461 kubelet[2217]: E0412 18:53:21.758430 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:21.765976 kubelet[2217]: I0412 18:53:21.765942 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kh6nr\" (UniqueName: \"kubernetes.io/projected/f298fc6a-b681-4cfd-b29e-3d785effe473-kube-api-access-kh6nr\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.765976 kubelet[2217]: I0412 18:53:21.765993 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d9c30d99-d4d5-49ca-a084-f4788f31e668-kubelet-dir\") pod \"csi-node-driver-8578c\" (UID: \"d9c30d99-d4d5-49ca-a084-f4788f31e668\") " pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:21.766209 kubelet[2217]: I0412 18:53:21.766023 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d9c30d99-d4d5-49ca-a084-f4788f31e668-socket-dir\") pod \"csi-node-driver-8578c\" (UID: \"d9c30d99-d4d5-49ca-a084-f4788f31e668\") " pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:21.766209 kubelet[2217]: I0412 18:53:21.766047 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-xtables-lock\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766209 kubelet[2217]: I0412 18:53:21.766074 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f298fc6a-b681-4cfd-b29e-3d785effe473-tigera-ca-bundle\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766209 kubelet[2217]: I0412 18:53:21.766123 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-var-run-calico\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766209 kubelet[2217]: I0412 18:53:21.766151 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-cni-bin-dir\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766412 kubelet[2217]: I0412 18:53:21.766178 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/35f713b4-44f5-4fd7-9b62-ec581e789ed3-xtables-lock\") pod \"kube-proxy-w5w74\" (UID: \"35f713b4-44f5-4fd7-9b62-ec581e789ed3\") " pod="kube-system/kube-proxy-w5w74" Apr 12 18:53:21.766412 kubelet[2217]: I0412 18:53:21.766214 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-96mh4\" (UniqueName: \"kubernetes.io/projected/35f713b4-44f5-4fd7-9b62-ec581e789ed3-kube-api-access-96mh4\") pod \"kube-proxy-w5w74\" (UID: \"35f713b4-44f5-4fd7-9b62-ec581e789ed3\") " pod="kube-system/kube-proxy-w5w74" Apr 12 18:53:21.766412 kubelet[2217]: I0412 18:53:21.766246 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-lib-modules\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766412 kubelet[2217]: I0412 18:53:21.766283 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-cni-net-dir\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766412 kubelet[2217]: I0412 18:53:21.766312 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-cni-log-dir\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766828 kubelet[2217]: I0412 18:53:21.766342 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/35f713b4-44f5-4fd7-9b62-ec581e789ed3-kube-proxy\") pod \"kube-proxy-w5w74\" (UID: \"35f713b4-44f5-4fd7-9b62-ec581e789ed3\") " pod="kube-system/kube-proxy-w5w74" Apr 12 18:53:21.766828 kubelet[2217]: I0412 18:53:21.766371 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-policysync\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.766828 kubelet[2217]: I0412 18:53:21.766408 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d9c30d99-d4d5-49ca-a084-f4788f31e668-varrun\") pod \"csi-node-driver-8578c\" (UID: \"d9c30d99-d4d5-49ca-a084-f4788f31e668\") " pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:21.766828 kubelet[2217]: I0412 18:53:21.766502 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d9c30d99-d4d5-49ca-a084-f4788f31e668-registration-dir\") pod \"csi-node-driver-8578c\" (UID: \"d9c30d99-d4d5-49ca-a084-f4788f31e668\") " pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:21.766828 kubelet[2217]: I0412 18:53:21.766550 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dc6c6\" (UniqueName: \"kubernetes.io/projected/d9c30d99-d4d5-49ca-a084-f4788f31e668-kube-api-access-dc6c6\") pod \"csi-node-driver-8578c\" (UID: \"d9c30d99-d4d5-49ca-a084-f4788f31e668\") " pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:21.767037 kubelet[2217]: I0412 18:53:21.766637 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f298fc6a-b681-4cfd-b29e-3d785effe473-node-certs\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.767037 kubelet[2217]: I0412 18:53:21.766670 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-var-lib-calico\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.767037 kubelet[2217]: I0412 18:53:21.766701 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f298fc6a-b681-4cfd-b29e-3d785effe473-flexvol-driver-host\") pod \"calico-node-tf2nq\" (UID: \"f298fc6a-b681-4cfd-b29e-3d785effe473\") " pod="calico-system/calico-node-tf2nq" Apr 12 18:53:21.767037 kubelet[2217]: I0412 18:53:21.766732 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/35f713b4-44f5-4fd7-9b62-ec581e789ed3-lib-modules\") pod \"kube-proxy-w5w74\" (UID: \"35f713b4-44f5-4fd7-9b62-ec581e789ed3\") " pod="kube-system/kube-proxy-w5w74" Apr 12 18:53:21.767037 kubelet[2217]: I0412 18:53:21.766768 2217 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:53:21.881800 kubelet[2217]: E0412 18:53:21.881764 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:21.881800 kubelet[2217]: W0412 18:53:21.881784 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:21.881972 kubelet[2217]: E0412 18:53:21.881810 2217 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:21.914314 kubelet[2217]: E0412 18:53:21.914277 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:21.914314 kubelet[2217]: W0412 18:53:21.914295 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:21.914314 kubelet[2217]: E0412 18:53:21.914317 2217 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:21.956421 kubelet[2217]: E0412 18:53:21.956356 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:21.956421 kubelet[2217]: W0412 18:53:21.956413 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:21.956835 kubelet[2217]: E0412 18:53:21.956439 2217 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:21.958170 kubelet[2217]: E0412 18:53:21.958153 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:21.958352 kubelet[2217]: W0412 18:53:21.958336 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:21.958468 kubelet[2217]: E0412 18:53:21.958455 2217 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:21.967805 kubelet[2217]: E0412 18:53:21.967781 2217 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:21.967805 kubelet[2217]: W0412 18:53:21.967802 2217 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:21.968137 kubelet[2217]: E0412 18:53:21.967880 2217 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:22.055866 env[1706]: time="2024-04-12T18:53:22.055744944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w5w74,Uid:35f713b4-44f5-4fd7-9b62-ec581e789ed3,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:22.059356 env[1706]: time="2024-04-12T18:53:22.059303876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tf2nq,Uid:f298fc6a-b681-4cfd-b29e-3d785effe473,Namespace:calico-system,Attempt:0,}" Apr 12 18:53:22.690318 env[1706]: time="2024-04-12T18:53:22.690255645Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.693437 env[1706]: time="2024-04-12T18:53:22.693387820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.695701 env[1706]: time="2024-04-12T18:53:22.695477554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.699812 env[1706]: time="2024-04-12T18:53:22.699768335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.702124 env[1706]: time="2024-04-12T18:53:22.702082304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.704420 env[1706]: time="2024-04-12T18:53:22.704376474Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.711389 env[1706]: time="2024-04-12T18:53:22.711342178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.715580 env[1706]: time="2024-04-12T18:53:22.715534695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:22.741703 env[1706]: time="2024-04-12T18:53:22.740128120Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:22.741703 env[1706]: time="2024-04-12T18:53:22.740162865Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:22.741703 env[1706]: time="2024-04-12T18:53:22.740181217Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:22.741703 env[1706]: time="2024-04-12T18:53:22.740384770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db pid=2275 runtime=io.containerd.runc.v2 Apr 12 18:53:22.747792 kubelet[2217]: E0412 18:53:22.747752 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:22.752151 env[1706]: time="2024-04-12T18:53:22.752074644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:22.752319 env[1706]: time="2024-04-12T18:53:22.752165257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:22.752319 env[1706]: time="2024-04-12T18:53:22.752193523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:22.752418 env[1706]: time="2024-04-12T18:53:22.752346574Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b171c891f3fd3e095e3d1691f3ce0425251667d330b10e00f0c67be52f1dcc8 pid=2296 runtime=io.containerd.runc.v2 Apr 12 18:53:22.828427 env[1706]: time="2024-04-12T18:53:22.828379585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tf2nq,Uid:f298fc6a-b681-4cfd-b29e-3d785effe473,Namespace:calico-system,Attempt:0,} returns sandbox id \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\"" Apr 12 18:53:22.831098 env[1706]: time="2024-04-12T18:53:22.831052268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:53:22.838279 env[1706]: time="2024-04-12T18:53:22.838229109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-w5w74,Uid:35f713b4-44f5-4fd7-9b62-ec581e789ed3,Namespace:kube-system,Attempt:0,} returns sandbox id \"3b171c891f3fd3e095e3d1691f3ce0425251667d330b10e00f0c67be52f1dcc8\"" Apr 12 18:53:22.885715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount198646597.mount: Deactivated successfully. Apr 12 18:53:23.030125 kubelet[2217]: E0412 18:53:23.029546 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:23.749362 kubelet[2217]: E0412 18:53:23.749159 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:23.896790 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3427000301.mount: Deactivated successfully. Apr 12 18:53:24.751002 kubelet[2217]: E0412 18:53:24.750896 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:24.895819 env[1706]: time="2024-04-12T18:53:24.895759689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:24.899082 env[1706]: time="2024-04-12T18:53:24.899039856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:24.902822 env[1706]: time="2024-04-12T18:53:24.902785754Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:24.906949 env[1706]: time="2024-04-12T18:53:24.906908396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:24.907633 env[1706]: time="2024-04-12T18:53:24.907597168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:53:24.910539 env[1706]: time="2024-04-12T18:53:24.910476479Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:53:24.911635 env[1706]: time="2024-04-12T18:53:24.911594871Z" level=info msg="CreateContainer within sandbox \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:53:24.929075 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1811606833.mount: Deactivated successfully. Apr 12 18:53:24.939059 env[1706]: time="2024-04-12T18:53:24.939000812Z" level=info msg="CreateContainer within sandbox \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988\"" Apr 12 18:53:24.941033 env[1706]: time="2024-04-12T18:53:24.940999073Z" level=info msg="StartContainer for \"b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988\"" Apr 12 18:53:25.036750 kubelet[2217]: E0412 18:53:25.036405 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:25.063370 env[1706]: time="2024-04-12T18:53:25.063313581Z" level=info msg="StartContainer for \"b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988\" returns successfully" Apr 12 18:53:25.682361 env[1706]: time="2024-04-12T18:53:25.682231955Z" level=info msg="shim disconnected" id=b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988 Apr 12 18:53:25.682361 env[1706]: time="2024-04-12T18:53:25.682340320Z" level=warning msg="cleaning up after shim disconnected" id=b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988 namespace=k8s.io Apr 12 18:53:25.682361 env[1706]: time="2024-04-12T18:53:25.682359765Z" level=info msg="cleaning up dead shim" Apr 12 18:53:25.693305 env[1706]: time="2024-04-12T18:53:25.693175255Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:53:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2398 runtime=io.containerd.runc.v2\n" Apr 12 18:53:25.751731 kubelet[2217]: E0412 18:53:25.751695 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:25.925289 systemd[1]: run-containerd-runc-k8s.io-b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988-runc.5vHvLs.mount: Deactivated successfully. Apr 12 18:53:25.925487 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b5d4cc7b215420af40484f0f11c88ade141002c382142a4a1a8cc2688e105988-rootfs.mount: Deactivated successfully. Apr 12 18:53:26.595917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1630951722.mount: Deactivated successfully. Apr 12 18:53:26.752429 kubelet[2217]: E0412 18:53:26.752374 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:27.030934 kubelet[2217]: E0412 18:53:27.029809 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:27.478936 env[1706]: time="2024-04-12T18:53:27.478577959Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:27.482152 env[1706]: time="2024-04-12T18:53:27.482111524Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:27.484726 env[1706]: time="2024-04-12T18:53:27.484690157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:27.486779 env[1706]: time="2024-04-12T18:53:27.486746998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:27.487872 env[1706]: time="2024-04-12T18:53:27.487839360Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\"" Apr 12 18:53:27.489477 env[1706]: time="2024-04-12T18:53:27.489445816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:53:27.490665 env[1706]: time="2024-04-12T18:53:27.490625719Z" level=info msg="CreateContainer within sandbox \"3b171c891f3fd3e095e3d1691f3ce0425251667d330b10e00f0c67be52f1dcc8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:53:27.527730 env[1706]: time="2024-04-12T18:53:27.527672168Z" level=info msg="CreateContainer within sandbox \"3b171c891f3fd3e095e3d1691f3ce0425251667d330b10e00f0c67be52f1dcc8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"72c143ca2c1544ec6695558e03655a5f75cd7ed1658d02850b8d01c9eda03446\"" Apr 12 18:53:27.528470 env[1706]: time="2024-04-12T18:53:27.528436182Z" level=info msg="StartContainer for \"72c143ca2c1544ec6695558e03655a5f75cd7ed1658d02850b8d01c9eda03446\"" Apr 12 18:53:27.640175 env[1706]: time="2024-04-12T18:53:27.640115881Z" level=info msg="StartContainer for \"72c143ca2c1544ec6695558e03655a5f75cd7ed1658d02850b8d01c9eda03446\" returns successfully" Apr 12 18:53:27.708000 audit[2472]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.708000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8e4b9a30 a2=0 a3=7ffe8e4b9a1c items=0 ppid=2433 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.723728 kernel: audit: type=1325 audit(1712948007.708:175): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.723861 kernel: audit: type=1300 audit(1712948007.708:175): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8e4b9a30 a2=0 a3=7ffe8e4b9a1c items=0 ppid=2433 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:27.732396 kernel: audit: type=1327 audit(1712948007.708:175): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:27.732511 kernel: audit: type=1325 audit(1712948007.708:176): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:27.708000 audit[2473]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:27.708000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff87d7e270 a2=0 a3=7fff87d7e25c items=0 ppid=2433 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.745694 kernel: audit: type=1300 audit(1712948007.708:176): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff87d7e270 a2=0 a3=7fff87d7e25c items=0 ppid=2433 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:27.749789 kernel: audit: type=1327 audit(1712948007.708:176): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:27.749971 kernel: audit: type=1325 audit(1712948007.713:177): table=nat:16 family=10 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:27.713000 audit[2474]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:27.753458 kubelet[2217]: E0412 18:53:27.753432 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:27.713000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe63b12ac0 a2=0 a3=7ffe63b12aac items=0 ppid=2433 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.761829 kernel: audit: type=1300 audit(1712948007.713:177): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe63b12ac0 a2=0 a3=7ffe63b12aac items=0 ppid=2433 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.761956 kernel: audit: type=1327 audit(1712948007.713:177): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:27.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:27.713000 audit[2475]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:27.771027 kernel: audit: type=1325 audit(1712948007.713:178): table=filter:17 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:27.713000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc4d2e1f0 a2=0 a3=7ffcc4d2e1dc items=0 ppid=2433 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:53:27.723000 audit[2476]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.723000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebb292460 a2=0 a3=7ffebb29244c items=0 ppid=2433 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:27.730000 audit[2477]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.730000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff40483cd0 a2=0 a3=7fff40483cbc items=0 ppid=2433 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:53:27.821000 audit[2478]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.821000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc32d5a870 a2=0 a3=7ffc32d5a85c items=0 ppid=2433 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:53:27.828000 audit[2480]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.828000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff864c3ae0 a2=0 a3=7fff864c3acc items=0 ppid=2433 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:53:27.833000 audit[2483]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.833000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd9adaaa30 a2=0 a3=7ffd9adaaa1c items=0 ppid=2433 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:53:27.836000 audit[2484]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.836000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3f1f44d0 a2=0 a3=7ffd3f1f44bc items=0 ppid=2433 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:53:27.840000 audit[2486]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.840000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1e654710 a2=0 a3=7ffd1e6546fc items=0 ppid=2433 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:53:27.841000 audit[2487]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.841000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc99b94980 a2=0 a3=7ffc99b9496c items=0 ppid=2433 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.841000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:53:27.844000 audit[2489]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.844000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff77bdbc10 a2=0 a3=7fff77bdbbfc items=0 ppid=2433 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:53:27.851000 audit[2492]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.851000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd956cd3c0 a2=0 a3=7ffd956cd3ac items=0 ppid=2433 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:53:27.853000 audit[2493]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.853000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff114eba50 a2=0 a3=7fff114eba3c items=0 ppid=2433 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:53:27.858000 audit[2495]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.858000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5583c510 a2=0 a3=7ffd5583c4fc items=0 ppid=2433 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:53:27.860000 audit[2496]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.860000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc20e1ac90 a2=0 a3=7ffc20e1ac7c items=0 ppid=2433 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:53:27.863000 audit[2498]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.863000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2f645770 a2=0 a3=7fff2f64575c items=0 ppid=2433 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:27.869000 audit[2501]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.869000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf43aeb90 a2=0 a3=7ffdf43aeb7c items=0 ppid=2433 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:27.874000 audit[2504]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2504 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.874000 audit[2504]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5ecc8360 a2=0 a3=7ffc5ecc834c items=0 ppid=2433 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:53:27.875000 audit[2505]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2505 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.875000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd428f9790 a2=0 a3=7ffd428f977c items=0 ppid=2433 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:53:27.880000 audit[2507]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2507 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.880000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe1cd56630 a2=0 a3=7ffe1cd5661c items=0 ppid=2433 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:27.919000 audit[2512]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2512 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.919000 audit[2512]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcbcd52aa0 a2=0 a3=7ffcbcd52a8c items=0 ppid=2433 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:27.932000 audit[2517]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2517 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.932000 audit[2517]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccb16e6a0 a2=0 a3=7ffccb16e68c items=0 ppid=2433 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:53:27.937000 audit[2519]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2519 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:27.937000 audit[2519]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdb0cb0cb0 a2=0 a3=7ffdb0cb0c9c items=0 ppid=2433 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:53:27.947000 audit[2521]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:27.947000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffffd42d1c0 a2=0 a3=7ffffd42d1ac items=0 ppid=2433 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:27.985000 audit[2521]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2521 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:27.985000 audit[2521]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffffd42d1c0 a2=0 a3=7ffffd42d1ac items=0 ppid=2433 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:27.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:28.044000 audit[2530]: NETFILTER_CFG table=filter:41 family=2 entries=8 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:28.044000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcb85b1e10 a2=0 a3=7ffcb85b1dfc items=0 ppid=2433 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:28.046000 audit[2530]: NETFILTER_CFG table=nat:42 family=2 entries=20 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:28.046000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb85b1e10 a2=0 a3=7ffcb85b1dfc items=0 ppid=2433 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:28.048000 audit[2531]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2531 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.048000 audit[2531]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe7219c7f0 a2=0 a3=7ffe7219c7dc items=0 ppid=2433 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:53:28.053000 audit[2533]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.053000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff23206230 a2=0 a3=7fff2320621c items=0 ppid=2433 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:53:28.060000 audit[2536]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.060000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffd6a68500 a2=0 a3=7fffd6a684ec items=0 ppid=2433 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:53:28.062000 audit[2537]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2537 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.062000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff299e89e0 a2=0 a3=7fff299e89cc items=0 ppid=2433 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:53:28.065000 audit[2539]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2539 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.065000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeaa626990 a2=0 a3=7ffeaa62697c items=0 ppid=2433 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:53:28.067000 audit[2540]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.067000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf054d000 a2=0 a3=7ffdf054cfec items=0 ppid=2433 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:53:28.072000 audit[2542]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.072000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd85efd4d0 a2=0 a3=7ffd85efd4bc items=0 ppid=2433 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:53:28.077000 audit[2545]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2545 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.077000 audit[2545]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc845094d0 a2=0 a3=7ffc845094bc items=0 ppid=2433 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:53:28.078000 audit[2546]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.078000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff65220180 a2=0 a3=7fff6522016c items=0 ppid=2433 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:53:28.082000 audit[2548]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2548 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.082000 audit[2548]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd76bc7e90 a2=0 a3=7ffd76bc7e7c items=0 ppid=2433 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:53:28.084000 audit[2549]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2549 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.084000 audit[2549]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0bdbf770 a2=0 a3=7ffe0bdbf75c items=0 ppid=2433 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:53:28.093000 audit[2551]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2551 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.093000 audit[2551]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed54c90d0 a2=0 a3=7ffed54c90bc items=0 ppid=2433 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:28.099000 audit[2554]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.099000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9eff8910 a2=0 a3=7ffe9eff88fc items=0 ppid=2433 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:53:28.104000 audit[2557]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.104000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf876e8f0 a2=0 a3=7ffdf876e8dc items=0 ppid=2433 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:53:28.105000 audit[2558]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2558 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.105000 audit[2558]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff128dc630 a2=0 a3=7fff128dc61c items=0 ppid=2433 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:53:28.110000 audit[2560]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=2560 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.110000 audit[2560]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe2934f010 a2=0 a3=7ffe2934effc items=0 ppid=2433 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:28.115000 audit[2563]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.115000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffd66ca430 a2=0 a3=7fffd66ca41c items=0 ppid=2433 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:28.117000 audit[2564]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2564 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.117000 audit[2564]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9a0ed2d0 a2=0 a3=7ffc9a0ed2bc items=0 ppid=2433 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:28.120116 kubelet[2217]: I0412 18:53:28.119331 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-w5w74" podStartSLOduration=2.470422462 podCreationTimestamp="2024-04-12 18:53:21 +0000 UTC" firstStartedPulling="2024-04-12 18:53:22.839715453 +0000 UTC m=+3.411339159" lastFinishedPulling="2024-04-12 18:53:27.488480887 +0000 UTC m=+8.060104597" observedRunningTime="2024-04-12 18:53:28.11370332 +0000 UTC m=+8.685327039" watchObservedRunningTime="2024-04-12 18:53:28.1191879 +0000 UTC m=+8.690811616" Apr 12 18:53:28.122000 audit[2566]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2566 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.122000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc003057a0 a2=0 a3=7ffc0030578c items=0 ppid=2433 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:28.127000 audit[2569]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2569 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.127000 audit[2569]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2bcb0510 a2=0 a3=7ffd2bcb04fc items=0 ppid=2433 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:28.129000 audit[2570]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.129000 audit[2570]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca3fc1be0 a2=0 a3=7ffca3fc1bcc items=0 ppid=2433 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:53:28.133000 audit[2572]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2572 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:28.133000 audit[2572]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff58b2dd00 a2=0 a3=7fff58b2dcec items=0 ppid=2433 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:53:28.139000 audit[2574]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=2574 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:53:28.139000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcbbe3a680 a2=0 a3=7ffcbbe3a66c items=0 ppid=2433 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.139000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:28.140000 audit[2574]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:53:28.140000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcbbe3a680 a2=0 a3=7ffcbbe3a66c items=0 ppid=2433 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:28.140000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:28.753720 kubelet[2217]: E0412 18:53:28.753671 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:29.030909 kubelet[2217]: E0412 18:53:29.030438 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:29.754398 kubelet[2217]: E0412 18:53:29.754361 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:30.754983 kubelet[2217]: E0412 18:53:30.754950 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:31.030124 kubelet[2217]: E0412 18:53:31.030011 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:31.756530 kubelet[2217]: E0412 18:53:31.756442 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:31.935395 amazon-ssm-agent[1681]: 2024-04-12 18:53:31 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Apr 12 18:53:32.757540 kubelet[2217]: E0412 18:53:32.757467 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:32.772768 env[1706]: time="2024-04-12T18:53:32.772675547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.776776 env[1706]: time="2024-04-12T18:53:32.776731272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.780014 env[1706]: time="2024-04-12T18:53:32.779969026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.784024 env[1706]: time="2024-04-12T18:53:32.783977788Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:32.785083 env[1706]: time="2024-04-12T18:53:32.785043017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:53:32.788185 env[1706]: time="2024-04-12T18:53:32.788147014Z" level=info msg="CreateContainer within sandbox \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:53:32.807388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount245778571.mount: Deactivated successfully. Apr 12 18:53:32.817543 env[1706]: time="2024-04-12T18:53:32.817481871Z" level=info msg="CreateContainer within sandbox \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3\"" Apr 12 18:53:32.818768 env[1706]: time="2024-04-12T18:53:32.818728833Z" level=info msg="StartContainer for \"ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3\"" Apr 12 18:53:32.933006 env[1706]: time="2024-04-12T18:53:32.932881792Z" level=info msg="StartContainer for \"ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3\" returns successfully" Apr 12 18:53:33.038982 kubelet[2217]: E0412 18:53:33.030241 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:33.758081 kubelet[2217]: E0412 18:53:33.758043 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:33.804018 systemd[1]: run-containerd-runc-k8s.io-ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3-runc.ANuhFM.mount: Deactivated successfully. Apr 12 18:53:34.473425 env[1706]: time="2024-04-12T18:53:34.473356406Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:53:34.506147 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3-rootfs.mount: Deactivated successfully. Apr 12 18:53:34.556976 kubelet[2217]: I0412 18:53:34.556044 2217 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:53:34.758827 kubelet[2217]: E0412 18:53:34.758702 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:34.986616 env[1706]: time="2024-04-12T18:53:34.986541906Z" level=info msg="shim disconnected" id=ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3 Apr 12 18:53:34.986616 env[1706]: time="2024-04-12T18:53:34.986612399Z" level=warning msg="cleaning up after shim disconnected" id=ac97bdacc9218ae373bb65793fd3725fe83a904c32fd47e47b894c13be3ad3e3 namespace=k8s.io Apr 12 18:53:34.986616 env[1706]: time="2024-04-12T18:53:34.986628847Z" level=info msg="cleaning up dead shim" Apr 12 18:53:35.012792 env[1706]: time="2024-04-12T18:53:35.011556540Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:53:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2623 runtime=io.containerd.runc.v2\n" Apr 12 18:53:35.037246 env[1706]: time="2024-04-12T18:53:35.037200762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8578c,Uid:d9c30d99-d4d5-49ca-a084-f4788f31e668,Namespace:calico-system,Attempt:0,}" Apr 12 18:53:35.112489 env[1706]: time="2024-04-12T18:53:35.112436148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:53:35.172358 env[1706]: time="2024-04-12T18:53:35.172235557Z" level=error msg="Failed to destroy network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:35.175383 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612-shm.mount: Deactivated successfully. Apr 12 18:53:35.176867 env[1706]: time="2024-04-12T18:53:35.176782378Z" level=error msg="encountered an error cleaning up failed sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:35.176995 env[1706]: time="2024-04-12T18:53:35.176891271Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8578c,Uid:d9c30d99-d4d5-49ca-a084-f4788f31e668,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:35.177253 kubelet[2217]: E0412 18:53:35.177221 2217 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:35.177381 kubelet[2217]: E0412 18:53:35.177288 2217 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:35.177381 kubelet[2217]: E0412 18:53:35.177320 2217 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8578c" Apr 12 18:53:35.177655 kubelet[2217]: E0412 18:53:35.177635 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8578c_calico-system(d9c30d99-d4d5-49ca-a084-f4788f31e668)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8578c_calico-system(d9c30d99-d4d5-49ca-a084-f4788f31e668)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:35.759869 kubelet[2217]: E0412 18:53:35.759817 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:35.959680 kernel: kauditd_printk_skb: 149 callbacks suppressed Apr 12 18:53:35.959817 kernel: audit: type=1131 audit(1712948015.951:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:35.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:35.951593 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:53:36.118818 kubelet[2217]: I0412 18:53:36.115890 2217 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:53:36.119237 env[1706]: time="2024-04-12T18:53:36.119192419Z" level=info msg="StopPodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\"" Apr 12 18:53:36.159658 env[1706]: time="2024-04-12T18:53:36.159586279Z" level=error msg="StopPodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" failed" error="failed to destroy network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:36.160402 kubelet[2217]: E0412 18:53:36.160364 2217 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:53:36.160555 kubelet[2217]: E0412 18:53:36.160432 2217 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612} Apr 12 18:53:36.160555 kubelet[2217]: E0412 18:53:36.160480 2217 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9c30d99-d4d5-49ca-a084-f4788f31e668\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:53:36.160555 kubelet[2217]: E0412 18:53:36.160535 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9c30d99-d4d5-49ca-a084-f4788f31e668\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8578c" podUID=d9c30d99-d4d5-49ca-a084-f4788f31e668 Apr 12 18:53:36.760963 kubelet[2217]: E0412 18:53:36.760857 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:37.761376 kubelet[2217]: E0412 18:53:37.761322 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:38.761758 kubelet[2217]: E0412 18:53:38.761692 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:39.744276 kubelet[2217]: E0412 18:53:39.744241 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:39.762656 kubelet[2217]: E0412 18:53:39.762574 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:40.763220 kubelet[2217]: E0412 18:53:40.763143 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:41.763653 kubelet[2217]: E0412 18:53:41.763602 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:41.832549 kubelet[2217]: I0412 18:53:41.830893 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:53:41.963498 kubelet[2217]: I0412 18:53:41.963384 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-446pk\" (UniqueName: \"kubernetes.io/projected/cc758947-7343-4961-a7d4-e981d009ed56-kube-api-access-446pk\") pod \"nginx-deployment-845c78c8b9-xkmr6\" (UID: \"cc758947-7343-4961-a7d4-e981d009ed56\") " pod="default/nginx-deployment-845c78c8b9-xkmr6" Apr 12 18:53:42.136369 env[1706]: time="2024-04-12T18:53:42.135947352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-xkmr6,Uid:cc758947-7343-4961-a7d4-e981d009ed56,Namespace:default,Attempt:0,}" Apr 12 18:53:42.319711 env[1706]: time="2024-04-12T18:53:42.319644665Z" level=error msg="Failed to destroy network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:42.322859 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a-shm.mount: Deactivated successfully. Apr 12 18:53:42.324108 env[1706]: time="2024-04-12T18:53:42.323840508Z" level=error msg="encountered an error cleaning up failed sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:42.324108 env[1706]: time="2024-04-12T18:53:42.323917513Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-xkmr6,Uid:cc758947-7343-4961-a7d4-e981d009ed56,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:42.324270 kubelet[2217]: E0412 18:53:42.324185 2217 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:53:42.324270 kubelet[2217]: E0412 18:53:42.324246 2217 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-xkmr6" Apr 12 18:53:42.324371 kubelet[2217]: E0412 18:53:42.324275 2217 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-xkmr6" Apr 12 18:53:42.324371 kubelet[2217]: E0412 18:53:42.324339 2217 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-xkmr6_default(cc758947-7343-4961-a7d4-e981d009ed56)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-xkmr6_default(cc758947-7343-4961-a7d4-e981d009ed56)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-xkmr6" podUID=cc758947-7343-4961-a7d4-e981d009ed56 Apr 12 18:53:42.484370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount193165757.mount: Deactivated successfully. Apr 12 18:53:42.621206 env[1706]: time="2024-04-12T18:53:42.620977235Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:42.623561 env[1706]: time="2024-04-12T18:53:42.623495292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:42.633171 env[1706]: time="2024-04-12T18:53:42.633111526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:42.640310 env[1706]: time="2024-04-12T18:53:42.640263993Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:42.641321 env[1706]: time="2024-04-12T18:53:42.641282505Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:53:42.659099 env[1706]: time="2024-04-12T18:53:42.659007436Z" level=info msg="CreateContainer within sandbox \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:53:42.680806 env[1706]: time="2024-04-12T18:53:42.680749070Z" level=info msg="CreateContainer within sandbox \"dddaae7322ee700b08820e42d6924cb9e6c97a244f36713c75bcf7d9c416f3db\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6462d155da102f3333126893f17d29d6caa43584d5e6a67b430f438fab6cc319\"" Apr 12 18:53:42.681744 env[1706]: time="2024-04-12T18:53:42.681705778Z" level=info msg="StartContainer for \"6462d155da102f3333126893f17d29d6caa43584d5e6a67b430f438fab6cc319\"" Apr 12 18:53:42.764733 kubelet[2217]: E0412 18:53:42.764225 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:42.803305 env[1706]: time="2024-04-12T18:53:42.803192783Z" level=info msg="StartContainer for \"6462d155da102f3333126893f17d29d6caa43584d5e6a67b430f438fab6cc319\" returns successfully" Apr 12 18:53:42.959754 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:53:42.959992 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:53:43.145757 kubelet[2217]: I0412 18:53:43.145662 2217 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:53:43.153109 env[1706]: time="2024-04-12T18:53:43.153069109Z" level=info msg="StopPodSandbox for \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\"" Apr 12 18:53:43.170111 kubelet[2217]: I0412 18:53:43.170071 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tf2nq" podStartSLOduration=2.358456692 podCreationTimestamp="2024-04-12 18:53:21 +0000 UTC" firstStartedPulling="2024-04-12 18:53:22.830267353 +0000 UTC m=+3.401891064" lastFinishedPulling="2024-04-12 18:53:42.641617721 +0000 UTC m=+23.213241420" observedRunningTime="2024-04-12 18:53:43.169532479 +0000 UTC m=+23.741156198" watchObservedRunningTime="2024-04-12 18:53:43.169807048 +0000 UTC m=+23.741430759" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.357 [INFO][2802] k8s.go 585: Cleaning up netns ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.357 [INFO][2802] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" iface="eth0" netns="/var/run/netns/cni-a56e6f9b-b3af-7e60-b0ee-ab4d084db68f" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.358 [INFO][2802] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" iface="eth0" netns="/var/run/netns/cni-a56e6f9b-b3af-7e60-b0ee-ab4d084db68f" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.358 [INFO][2802] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" iface="eth0" netns="/var/run/netns/cni-a56e6f9b-b3af-7e60-b0ee-ab4d084db68f" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.359 [INFO][2802] k8s.go 592: Releasing IP address(es) ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.359 [INFO][2802] utils.go 188: Calico CNI releasing IP address ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.385 [INFO][2819] ipam_plugin.go 415: Releasing address using handleID ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.386 [INFO][2819] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.386 [INFO][2819] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.397 [WARNING][2819] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.397 [INFO][2819] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.399 [INFO][2819] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:53:43.404903 env[1706]: 2024-04-12 18:53:43.401 [INFO][2802] k8s.go 598: Teardown processing complete. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:53:43.411764 systemd[1]: run-netns-cni\x2da56e6f9b\x2db3af\x2d7e60\x2db0ee\x2dab4d084db68f.mount: Deactivated successfully. Apr 12 18:53:43.413446 env[1706]: time="2024-04-12T18:53:43.413400687Z" level=info msg="TearDown network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\" successfully" Apr 12 18:53:43.413588 env[1706]: time="2024-04-12T18:53:43.413565218Z" level=info msg="StopPodSandbox for \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\" returns successfully" Apr 12 18:53:43.414677 env[1706]: time="2024-04-12T18:53:43.414644347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-xkmr6,Uid:cc758947-7343-4961-a7d4-e981d009ed56,Namespace:default,Attempt:1,}" Apr 12 18:53:43.585580 kernel: Initializing XFRM netlink socket Apr 12 18:53:43.595814 systemd-networkd[1502]: cali4ab53cb2e6d: Link UP Apr 12 18:53:43.598803 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4ab53cb2e6d: link becomes ready Apr 12 18:53:43.599314 (udev-worker)[2858]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:43.599773 systemd-networkd[1502]: cali4ab53cb2e6d: Gained carrier Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.471 [INFO][2837] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.486 [INFO][2837] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0 nginx-deployment-845c78c8b9- default cc758947-7343-4961-a7d4-e981d009ed56 940 0 2024-04-12 18:53:41 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.16.199 nginx-deployment-845c78c8b9-xkmr6 eth0 default [] [] [kns.default ksa.default.default] cali4ab53cb2e6d [] []}} ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.486 [INFO][2837] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.518 [INFO][2849] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" HandleID="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.536 [INFO][2849] ipam_plugin.go 268: Auto assigning IP ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" HandleID="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b03d0), Attrs:map[string]string{"namespace":"default", "node":"172.31.16.199", "pod":"nginx-deployment-845c78c8b9-xkmr6", "timestamp":"2024-04-12 18:53:43.518532222 +0000 UTC"}, Hostname:"172.31.16.199", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.536 [INFO][2849] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.536 [INFO][2849] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.536 [INFO][2849] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.199' Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.538 [INFO][2849] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.545 [INFO][2849] ipam.go 372: Looking up existing affinities for host host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.550 [INFO][2849] ipam.go 489: Trying affinity for 192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.554 [INFO][2849] ipam.go 155: Attempting to load block cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.556 [INFO][2849] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.556 [INFO][2849] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.0/26 handle="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.558 [INFO][2849] ipam.go 1682: Creating new handle: k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48 Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.563 [INFO][2849] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.0/26 handle="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.569 [INFO][2849] ipam.go 1216: Successfully claimed IPs: [192.168.126.1/26] block=192.168.126.0/26 handle="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.569 [INFO][2849] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.1/26] handle="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" host="172.31.16.199" Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.569 [INFO][2849] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:53:43.619714 env[1706]: 2024-04-12 18:53:43.569 [INFO][2849] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.1/26] IPv6=[] ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" HandleID="k8s-pod-network.a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.621311 env[1706]: 2024-04-12 18:53:43.572 [INFO][2837] k8s.go 385: Populated endpoint ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"cc758947-7343-4961-a7d4-e981d009ed56", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-xkmr6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4ab53cb2e6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:53:43.621311 env[1706]: 2024-04-12 18:53:43.572 [INFO][2837] k8s.go 386: Calico CNI using IPs: [192.168.126.1/32] ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.621311 env[1706]: 2024-04-12 18:53:43.572 [INFO][2837] dataplane_linux.go 68: Setting the host side veth name to cali4ab53cb2e6d ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.621311 env[1706]: 2024-04-12 18:53:43.597 [INFO][2837] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.621311 env[1706]: 2024-04-12 18:53:43.598 [INFO][2837] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"cc758947-7343-4961-a7d4-e981d009ed56", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48", Pod:"nginx-deployment-845c78c8b9-xkmr6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4ab53cb2e6d", MAC:"12:a7:e3:0a:d9:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:53:43.621311 env[1706]: 2024-04-12 18:53:43.618 [INFO][2837] k8s.go 498: Wrote updated endpoint to datastore ContainerID="a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48" Namespace="default" Pod="nginx-deployment-845c78c8b9-xkmr6" WorkloadEndpoint="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:53:43.634926 env[1706]: time="2024-04-12T18:53:43.634825820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:43.634926 env[1706]: time="2024-04-12T18:53:43.634891455Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:43.634926 env[1706]: time="2024-04-12T18:53:43.634906777Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:43.635573 env[1706]: time="2024-04-12T18:53:43.635486947Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48 pid=2876 runtime=io.containerd.runc.v2 Apr 12 18:53:43.748135 env[1706]: time="2024-04-12T18:53:43.748095573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-xkmr6,Uid:cc758947-7343-4961-a7d4-e981d009ed56,Namespace:default,Attempt:1,} returns sandbox id \"a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48\"" Apr 12 18:53:43.750460 env[1706]: time="2024-04-12T18:53:43.750354372Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:53:43.764931 kubelet[2217]: E0412 18:53:43.764882 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:44.194971 systemd[1]: run-containerd-runc-k8s.io-6462d155da102f3333126893f17d29d6caa43584d5e6a67b430f438fab6cc319-runc.ERqMcz.mount: Deactivated successfully. Apr 12 18:53:44.552000 audit[2979]: AVC avc: denied { write } for pid=2979 comm="tee" name="fd" dev="proc" ino=20060 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.559712 kernel: audit: type=1400 audit(1712948024.552:229): avc: denied { write } for pid=2979 comm="tee" name="fd" dev="proc" ino=20060 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.552000 audit[2979]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8fd2197c a2=241 a3=1b6 items=1 ppid=2941 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.569546 kernel: audit: type=1300 audit(1712948024.552:229): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8fd2197c a2=241 a3=1b6 items=1 ppid=2941 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.552000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:53:44.587541 kernel: audit: type=1307 audit(1712948024.552:229): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:53:44.552000 audit: PATH item=0 name="/dev/fd/63" inode=20054 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.598541 kernel: audit: type=1302 audit(1712948024.552:229): item=0 name="/dev/fd/63" inode=20054 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.552000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.609547 kernel: audit: type=1327 audit(1712948024.552:229): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.568000 audit[2989]: AVC avc: denied { write } for pid=2989 comm="tee" name="fd" dev="proc" ino=20070 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.615599 kernel: audit: type=1400 audit(1712948024.568:230): avc: denied { write } for pid=2989 comm="tee" name="fd" dev="proc" ino=20070 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.568000 audit[2989]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd945de98c a2=241 a3=1b6 items=1 ppid=2947 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.635544 kernel: audit: type=1300 audit(1712948024.568:230): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd945de98c a2=241 a3=1b6 items=1 ppid=2947 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.568000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:53:44.646547 kernel: audit: type=1307 audit(1712948024.568:230): cwd="/etc/service/enabled/confd/log" Apr 12 18:53:44.568000 audit: PATH item=0 name="/dev/fd/63" inode=20057 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.656778 kernel: audit: type=1302 audit(1712948024.568:230): item=0 name="/dev/fd/63" inode=20057 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.568000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.573000 audit[2975]: AVC avc: denied { write } for pid=2975 comm="tee" name="fd" dev="proc" ino=20074 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.573000 audit[2975]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc293c498e a2=241 a3=1b6 items=1 ppid=2943 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.662593 kernel: audit: type=1327 audit(1712948024.568:230): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.573000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:53:44.573000 audit: PATH item=0 name="/dev/fd/63" inode=19414 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.573000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.609000 audit[2988]: AVC avc: denied { write } for pid=2988 comm="tee" name="fd" dev="proc" ino=20088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.609000 audit[2988]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4bdb698c a2=241 a3=1b6 items=1 ppid=2945 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.609000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:53:44.609000 audit: PATH item=0 name="/dev/fd/63" inode=19419 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.609000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.609000 audit[2995]: AVC avc: denied { write } for pid=2995 comm="tee" name="fd" dev="proc" ino=20090 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.609000 audit[2995]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcba6c97d a2=241 a3=1b6 items=1 ppid=2944 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.609000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:53:44.609000 audit: PATH item=0 name="/dev/fd/63" inode=19422 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.609000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.634000 audit[3011]: AVC avc: denied { write } for pid=3011 comm="tee" name="fd" dev="proc" ino=20095 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.634000 audit[3011]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6c50f98c a2=241 a3=1b6 items=1 ppid=2952 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.634000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:53:44.634000 audit: PATH item=0 name="/dev/fd/63" inode=20078 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.634000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.647000 audit[3015]: AVC avc: denied { write } for pid=3015 comm="tee" name="fd" dev="proc" ino=20099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:53:44.647000 audit[3015]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9c77898d a2=241 a3=1b6 items=1 ppid=2956 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:44.647000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:53:44.647000 audit: PATH item=0 name="/dev/fd/63" inode=20093 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:53:44.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:53:44.765863 kubelet[2217]: E0412 18:53:44.765816 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:44.804683 systemd-networkd[1502]: cali4ab53cb2e6d: Gained IPv6LL Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit: BPF prog-id=10 op=LOAD Apr 12 18:53:45.164000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb1ac0cc0 a2=70 a3=7f99240da000 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.164000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit: BPF prog-id=11 op=LOAD Apr 12 18:53:45.164000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb1ac0cc0 a2=70 a3=6f items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.164000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb1ac0c70 a2=70 a3=7ffeb1ac0cc0 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit: BPF prog-id=12 op=LOAD Apr 12 18:53:45.164000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffeb1ac0c50 a2=70 a3=7ffeb1ac0cc0 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.164000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb1ac0d30 a2=70 a3=0 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.164000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.164000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb1ac0d20 a2=70 a3=0 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.164000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.165000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.165000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb1ac0c90 a2=70 a3=0 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.165000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffeb1ac0d60 a2=70 a3=da8f60 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb1ac0d60 a2=70 a3=da5880 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { perfmon } for pid=3078 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit[3078]: AVC avc: denied { bpf } for pid=3078 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.166000 audit: BPF prog-id=13 op=LOAD Apr 12 18:53:45.166000 audit[3078]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb1ac0c80 a2=70 a3=0 items=0 ppid=2950 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.166000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:53:45.164475 (udev-worker)[2764]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:45.174000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.174000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebc458730 a2=70 a3=fff80800 items=0 ppid=2950 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:53:45.174000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.174000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebc458600 a2=70 a3=3 items=0 ppid=2950 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:53:45.185000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:53:45.326000 audit[3109]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:45.326000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff3b916530 a2=0 a3=7fff3b91651c items=0 ppid=2950 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.326000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:45.337000 audit[3105]: NETFILTER_CFG table=raw:68 family=2 entries=19 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:45.337000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe54d3f540 a2=0 a3=7ffe54d3f52c items=0 ppid=2950 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.337000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:45.339000 audit[3106]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:45.339000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffece20d900 a2=0 a3=7ffece20d8ec items=0 ppid=2950 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.339000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:45.348000 audit[3111]: NETFILTER_CFG table=filter:70 family=2 entries=71 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:45.348000 audit[3111]: SYSCALL arch=c000003e syscall=46 success=yes exit=37628 a0=3 a1=7ffeb5599990 a2=0 a3=7ffeb559997c items=0 ppid=2950 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.348000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:45.766332 kubelet[2217]: E0412 18:53:45.766280 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:46.119989 systemd-networkd[1502]: vxlan.calico: Link UP Apr 12 18:53:46.119998 systemd-networkd[1502]: vxlan.calico: Gained carrier Apr 12 18:53:46.152283 (udev-worker)[3092]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:46.767385 kubelet[2217]: E0412 18:53:46.767346 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:47.207715 systemd-networkd[1502]: vxlan.calico: Gained IPv6LL Apr 12 18:53:47.443849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4220871434.mount: Deactivated successfully. Apr 12 18:53:47.768359 kubelet[2217]: E0412 18:53:47.768303 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:48.602075 env[1706]: time="2024-04-12T18:53:48.602023582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.606008 env[1706]: time="2024-04-12T18:53:48.605962005Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.608631 env[1706]: time="2024-04-12T18:53:48.608593879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.610872 env[1706]: time="2024-04-12T18:53:48.610831737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.611588 env[1706]: time="2024-04-12T18:53:48.611549876Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:53:48.613449 env[1706]: time="2024-04-12T18:53:48.613416069Z" level=info msg="CreateContainer within sandbox \"a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Apr 12 18:53:48.631697 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2971412972.mount: Deactivated successfully. Apr 12 18:53:48.642984 env[1706]: time="2024-04-12T18:53:48.642935842Z" level=info msg="CreateContainer within sandbox \"a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"933a8c290934b4c23a9d0acac710057bd26a0687f2fb00179e056559629c767a\"" Apr 12 18:53:48.643711 env[1706]: time="2024-04-12T18:53:48.643680079Z" level=info msg="StartContainer for \"933a8c290934b4c23a9d0acac710057bd26a0687f2fb00179e056559629c767a\"" Apr 12 18:53:48.710257 env[1706]: time="2024-04-12T18:53:48.710220257Z" level=info msg="StartContainer for \"933a8c290934b4c23a9d0acac710057bd26a0687f2fb00179e056559629c767a\" returns successfully" Apr 12 18:53:48.769181 kubelet[2217]: E0412 18:53:48.769131 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:49.220485 kubelet[2217]: I0412 18:53:49.220447 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-xkmr6" podStartSLOduration=3.358429274 podCreationTimestamp="2024-04-12 18:53:41 +0000 UTC" firstStartedPulling="2024-04-12 18:53:43.749878392 +0000 UTC m=+24.321502088" lastFinishedPulling="2024-04-12 18:53:48.611858343 +0000 UTC m=+29.183482064" observedRunningTime="2024-04-12 18:53:49.220197546 +0000 UTC m=+29.791821266" watchObservedRunningTime="2024-04-12 18:53:49.22040925 +0000 UTC m=+29.792033002" Apr 12 18:53:49.769499 kubelet[2217]: E0412 18:53:49.769449 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:50.030809 env[1706]: time="2024-04-12T18:53:50.030598930Z" level=info msg="StopPodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\"" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.171 [INFO][3191] k8s.go 585: Cleaning up netns ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.171 [INFO][3191] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" iface="eth0" netns="/var/run/netns/cni-7403aa3e-2f24-692f-bea2-18170d73b23d" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.171 [INFO][3191] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" iface="eth0" netns="/var/run/netns/cni-7403aa3e-2f24-692f-bea2-18170d73b23d" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.172 [INFO][3191] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" iface="eth0" netns="/var/run/netns/cni-7403aa3e-2f24-692f-bea2-18170d73b23d" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.172 [INFO][3191] k8s.go 592: Releasing IP address(es) ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.172 [INFO][3191] utils.go 188: Calico CNI releasing IP address ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.231 [INFO][3197] ipam_plugin.go 415: Releasing address using handleID ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.231 [INFO][3197] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.232 [INFO][3197] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.241 [WARNING][3197] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.241 [INFO][3197] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.244 [INFO][3197] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:53:50.246291 env[1706]: 2024-04-12 18:53:50.245 [INFO][3191] k8s.go 598: Teardown processing complete. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:53:50.249683 env[1706]: time="2024-04-12T18:53:50.249629745Z" level=info msg="TearDown network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" successfully" Apr 12 18:53:50.249869 env[1706]: time="2024-04-12T18:53:50.249839576Z" level=info msg="StopPodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" returns successfully" Apr 12 18:53:50.251130 systemd[1]: run-netns-cni\x2d7403aa3e\x2d2f24\x2d692f\x2dbea2\x2d18170d73b23d.mount: Deactivated successfully. Apr 12 18:53:50.252214 env[1706]: time="2024-04-12T18:53:50.252174866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8578c,Uid:d9c30d99-d4d5-49ca-a084-f4788f31e668,Namespace:calico-system,Attempt:1,}" Apr 12 18:53:50.514965 systemd-networkd[1502]: cali0d2b2163f8c: Link UP Apr 12 18:53:50.519790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:53:50.520035 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0d2b2163f8c: link becomes ready Apr 12 18:53:50.519993 systemd-networkd[1502]: cali0d2b2163f8c: Gained carrier Apr 12 18:53:50.521972 (udev-worker)[3230]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.319 [INFO][3204] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.199-k8s-csi--node--driver--8578c-eth0 csi-node-driver- calico-system d9c30d99-d4d5-49ca-a084-f4788f31e668 967 0 2024-04-12 18:53:21 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.16.199 csi-node-driver-8578c eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0d2b2163f8c [] []}} ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.319 [INFO][3204] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.426 [INFO][3220] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" HandleID="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.441 [INFO][3220] ipam_plugin.go 268: Auto assigning IP ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" HandleID="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281ec0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.16.199", "pod":"csi-node-driver-8578c", "timestamp":"2024-04-12 18:53:50.426200123 +0000 UTC"}, Hostname:"172.31.16.199", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.441 [INFO][3220] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.442 [INFO][3220] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.442 [INFO][3220] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.199' Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.447 [INFO][3220] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.464 [INFO][3220] ipam.go 372: Looking up existing affinities for host host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.474 [INFO][3220] ipam.go 489: Trying affinity for 192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.480 [INFO][3220] ipam.go 155: Attempting to load block cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.485 [INFO][3220] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.485 [INFO][3220] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.0/26 handle="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.490 [INFO][3220] ipam.go 1682: Creating new handle: k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.500 [INFO][3220] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.0/26 handle="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.508 [INFO][3220] ipam.go 1216: Successfully claimed IPs: [192.168.126.2/26] block=192.168.126.0/26 handle="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.508 [INFO][3220] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.2/26] handle="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" host="172.31.16.199" Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.508 [INFO][3220] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:53:50.547855 env[1706]: 2024-04-12 18:53:50.508 [INFO][3220] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.2/26] IPv6=[] ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" HandleID="k8s-pod-network.8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.551382 env[1706]: 2024-04-12 18:53:50.510 [INFO][3204] k8s.go 385: Populated endpoint ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-csi--node--driver--8578c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9c30d99-d4d5-49ca-a084-f4788f31e668", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"", Pod:"csi-node-driver-8578c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0d2b2163f8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:53:50.551382 env[1706]: 2024-04-12 18:53:50.510 [INFO][3204] k8s.go 386: Calico CNI using IPs: [192.168.126.2/32] ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.551382 env[1706]: 2024-04-12 18:53:50.510 [INFO][3204] dataplane_linux.go 68: Setting the host side veth name to cali0d2b2163f8c ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.551382 env[1706]: 2024-04-12 18:53:50.520 [INFO][3204] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.551382 env[1706]: 2024-04-12 18:53:50.521 [INFO][3204] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-csi--node--driver--8578c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9c30d99-d4d5-49ca-a084-f4788f31e668", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf", Pod:"csi-node-driver-8578c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0d2b2163f8c", MAC:"5a:87:10:44:95:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:53:50.551382 env[1706]: 2024-04-12 18:53:50.537 [INFO][3204] k8s.go 498: Wrote updated endpoint to datastore ContainerID="8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf" Namespace="calico-system" Pod="csi-node-driver-8578c" WorkloadEndpoint="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:53:50.580000 audit[3247]: NETFILTER_CFG table=filter:71 family=2 entries=40 op=nft_register_chain pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:50.588306 kernel: kauditd_printk_skb: 114 callbacks suppressed Apr 12 18:53:50.588492 kernel: audit: type=1325 audit(1712948030.580:256): table=filter:71 family=2 entries=40 op=nft_register_chain pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:50.580000 audit[3247]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffead7228d0 a2=0 a3=7ffead7228bc items=0 ppid=2950 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.596639 kernel: audit: type=1300 audit(1712948030.580:256): arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffead7228d0 a2=0 a3=7ffead7228bc items=0 ppid=2950 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:50.603578 kernel: audit: type=1327 audit(1712948030.580:256): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:50.609012 env[1706]: time="2024-04-12T18:53:50.608936617Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:50.609196 env[1706]: time="2024-04-12T18:53:50.608987131Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:50.609196 env[1706]: time="2024-04-12T18:53:50.609001996Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:50.609703 env[1706]: time="2024-04-12T18:53:50.609660071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf pid=3256 runtime=io.containerd.runc.v2 Apr 12 18:53:50.621698 update_engine[1699]: I0412 18:53:50.621196 1699 update_attempter.cc:509] Updating boot flags... Apr 12 18:53:50.740680 env[1706]: time="2024-04-12T18:53:50.740628258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8578c,Uid:d9c30d99-d4d5-49ca-a084-f4788f31e668,Namespace:calico-system,Attempt:1,} returns sandbox id \"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf\"" Apr 12 18:53:50.744964 env[1706]: time="2024-04-12T18:53:50.744921791Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:53:50.772818 kubelet[2217]: E0412 18:53:50.770168 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:51.627672 systemd-networkd[1502]: cali0d2b2163f8c: Gained IPv6LL Apr 12 18:53:51.770912 kubelet[2217]: E0412 18:53:51.770838 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:51.849235 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2607622038.mount: Deactivated successfully. Apr 12 18:53:52.301439 env[1706]: time="2024-04-12T18:53:52.301384309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.307018 env[1706]: time="2024-04-12T18:53:52.306972381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.311222 env[1706]: time="2024-04-12T18:53:52.311172627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.312613 env[1706]: time="2024-04-12T18:53:52.312579989Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:52.313258 env[1706]: time="2024-04-12T18:53:52.313226185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:53:52.315639 env[1706]: time="2024-04-12T18:53:52.315607316Z" level=info msg="CreateContainer within sandbox \"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:53:52.332999 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount420513070.mount: Deactivated successfully. Apr 12 18:53:52.341631 env[1706]: time="2024-04-12T18:53:52.341583812Z" level=info msg="CreateContainer within sandbox \"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"cb3e884958f75aec5985a80ebcdab766fd7c7f97bd6b66ad5bf689a9782dae28\"" Apr 12 18:53:52.342641 env[1706]: time="2024-04-12T18:53:52.342602497Z" level=info msg="StartContainer for \"cb3e884958f75aec5985a80ebcdab766fd7c7f97bd6b66ad5bf689a9782dae28\"" Apr 12 18:53:52.412422 env[1706]: time="2024-04-12T18:53:52.412353995Z" level=info msg="StartContainer for \"cb3e884958f75aec5985a80ebcdab766fd7c7f97bd6b66ad5bf689a9782dae28\" returns successfully" Apr 12 18:53:52.415654 env[1706]: time="2024-04-12T18:53:52.415624155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:53:52.771466 kubelet[2217]: E0412 18:53:52.771412 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:53.772367 kubelet[2217]: E0412 18:53:53.772301 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:54.047161 env[1706]: time="2024-04-12T18:53:54.046919576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:54.053634 env[1706]: time="2024-04-12T18:53:54.053591065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:54.056122 env[1706]: time="2024-04-12T18:53:54.056083241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:54.058279 env[1706]: time="2024-04-12T18:53:54.058244225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:54.058836 env[1706]: time="2024-04-12T18:53:54.058792789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:53:54.061361 env[1706]: time="2024-04-12T18:53:54.061326190Z" level=info msg="CreateContainer within sandbox \"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:53:54.085057 env[1706]: time="2024-04-12T18:53:54.085003063Z" level=info msg="CreateContainer within sandbox \"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a921cc820613c9fd9dfacce1fded22da09774c492eb8633d1e02dff799693fe6\"" Apr 12 18:53:54.086111 env[1706]: time="2024-04-12T18:53:54.086079550Z" level=info msg="StartContainer for \"a921cc820613c9fd9dfacce1fded22da09774c492eb8633d1e02dff799693fe6\"" Apr 12 18:53:54.180414 env[1706]: time="2024-04-12T18:53:54.180363065Z" level=info msg="StartContainer for \"a921cc820613c9fd9dfacce1fded22da09774c492eb8633d1e02dff799693fe6\" returns successfully" Apr 12 18:53:54.271338 kubelet[2217]: I0412 18:53:54.271301 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-8578c" podStartSLOduration=29.956467871 podCreationTimestamp="2024-04-12 18:53:21 +0000 UTC" firstStartedPulling="2024-04-12 18:53:50.744333518 +0000 UTC m=+31.315957231" lastFinishedPulling="2024-04-12 18:53:54.059100941 +0000 UTC m=+34.630724649" observedRunningTime="2024-04-12 18:53:54.271174088 +0000 UTC m=+34.842797807" watchObservedRunningTime="2024-04-12 18:53:54.271235289 +0000 UTC m=+34.842859004" Apr 12 18:53:54.772481 kubelet[2217]: E0412 18:53:54.772430 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:54.942242 kubelet[2217]: I0412 18:53:54.942200 2217 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:53:54.942947 kubelet[2217]: I0412 18:53:54.942923 2217 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:53:55.773242 kubelet[2217]: E0412 18:53:55.773205 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:56.777842 kubelet[2217]: E0412 18:53:56.777585 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:57.101000 audit[3495]: NETFILTER_CFG table=filter:72 family=2 entries=20 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.101000 audit[3495]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff913a3c20 a2=0 a3=7fff913a3c0c items=0 ppid=2433 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.115423 kernel: audit: type=1325 audit(1712948037.101:257): table=filter:72 family=2 entries=20 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.115625 kernel: audit: type=1300 audit(1712948037.101:257): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff913a3c20 a2=0 a3=7fff913a3c0c items=0 ppid=2433 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.117000 audit[3495]: NETFILTER_CFG table=nat:73 family=2 entries=20 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.122901 kernel: audit: type=1327 audit(1712948037.101:257): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.123011 kernel: audit: type=1325 audit(1712948037.117:258): table=nat:73 family=2 entries=20 op=nft_register_rule pid=3495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.123046 kernel: audit: type=1300 audit(1712948037.117:258): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff913a3c20 a2=0 a3=0 items=0 ppid=2433 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.117000 audit[3495]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff913a3c20 a2=0 a3=0 items=0 ppid=2433 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.135753 kernel: audit: type=1327 audit(1712948037.117:258): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.181000 audit[3499]: NETFILTER_CFG table=filter:74 family=2 entries=32 op=nft_register_rule pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.181000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff53f93420 a2=0 a3=7fff53f9340c items=0 ppid=2433 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.194938 kernel: audit: type=1325 audit(1712948037.181:259): table=filter:74 family=2 entries=32 op=nft_register_rule pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.195057 kernel: audit: type=1300 audit(1712948037.181:259): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff53f93420 a2=0 a3=7fff53f9340c items=0 ppid=2433 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.195093 kernel: audit: type=1327 audit(1712948037.181:259): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.184000 audit[3499]: NETFILTER_CFG table=nat:75 family=2 entries=20 op=nft_register_rule pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.202312 kernel: audit: type=1325 audit(1712948037.184:260): table=nat:75 family=2 entries=20 op=nft_register_rule pid=3499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:57.184000 audit[3499]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff53f93420 a2=0 a3=0 items=0 ppid=2433 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:57.251718 kubelet[2217]: I0412 18:53:57.251672 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:53:57.359702 kubelet[2217]: I0412 18:53:57.359488 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/24adaa5d-685e-4833-ab59-91b814d63106-data\") pod \"nfs-server-provisioner-0\" (UID: \"24adaa5d-685e-4833-ab59-91b814d63106\") " pod="default/nfs-server-provisioner-0" Apr 12 18:53:57.359702 kubelet[2217]: I0412 18:53:57.359567 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9k24n\" (UniqueName: \"kubernetes.io/projected/24adaa5d-685e-4833-ab59-91b814d63106-kube-api-access-9k24n\") pod \"nfs-server-provisioner-0\" (UID: \"24adaa5d-685e-4833-ab59-91b814d63106\") " pod="default/nfs-server-provisioner-0" Apr 12 18:53:57.556884 env[1706]: time="2024-04-12T18:53:57.556824380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:24adaa5d-685e-4833-ab59-91b814d63106,Namespace:default,Attempt:0,}" Apr 12 18:53:57.778502 kubelet[2217]: E0412 18:53:57.778442 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:57.781200 (udev-worker)[3497]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:53:57.782130 systemd-networkd[1502]: cali60e51b789ff: Link UP Apr 12 18:53:57.788861 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:53:57.788957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Apr 12 18:53:57.788097 systemd-networkd[1502]: cali60e51b789ff: Gained carrier Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.651 [INFO][3502] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.199-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 24adaa5d-685e-4833-ab59-91b814d63106 1018 0 2024-04-12 18:53:57 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.16.199 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.652 [INFO][3502] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.712 [INFO][3513] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" HandleID="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Workload="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.731 [INFO][3513] ipam_plugin.go 268: Auto assigning IP ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" HandleID="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Workload="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000280ed0), Attrs:map[string]string{"namespace":"default", "node":"172.31.16.199", "pod":"nfs-server-provisioner-0", "timestamp":"2024-04-12 18:53:57.712461828 +0000 UTC"}, Hostname:"172.31.16.199", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.731 [INFO][3513] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.731 [INFO][3513] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.731 [INFO][3513] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.199' Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.734 [INFO][3513] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.739 [INFO][3513] ipam.go 372: Looking up existing affinities for host host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.746 [INFO][3513] ipam.go 489: Trying affinity for 192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.750 [INFO][3513] ipam.go 155: Attempting to load block cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.755 [INFO][3513] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.755 [INFO][3513] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.0/26 handle="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.761 [INFO][3513] ipam.go 1682: Creating new handle: k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332 Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.768 [INFO][3513] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.0/26 handle="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.776 [INFO][3513] ipam.go 1216: Successfully claimed IPs: [192.168.126.3/26] block=192.168.126.0/26 handle="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.777 [INFO][3513] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.3/26] handle="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" host="172.31.16.199" Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.777 [INFO][3513] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:53:57.810195 env[1706]: 2024-04-12 18:53:57.777 [INFO][3513] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.3/26] IPv6=[] ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" HandleID="k8s-pod-network.dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Workload="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.811269 env[1706]: 2024-04-12 18:53:57.778 [INFO][3502] k8s.go 385: Populated endpoint ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"24adaa5d-685e-4833-ab59-91b814d63106", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:53:57.811269 env[1706]: 2024-04-12 18:53:57.778 [INFO][3502] k8s.go 386: Calico CNI using IPs: [192.168.126.3/32] ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.811269 env[1706]: 2024-04-12 18:53:57.778 [INFO][3502] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.811269 env[1706]: 2024-04-12 18:53:57.788 [INFO][3502] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.811799 env[1706]: 2024-04-12 18:53:57.788 [INFO][3502] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"24adaa5d-685e-4833-ab59-91b814d63106", ResourceVersion:"1018", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"06:a0:e8:57:28:e5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:53:57.811799 env[1706]: 2024-04-12 18:53:57.808 [INFO][3502] k8s.go 498: Wrote updated endpoint to datastore ContainerID="dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.16.199-k8s-nfs--server--provisioner--0-eth0" Apr 12 18:53:57.843000 audit[3537]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_chain pid=3537 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:53:57.843000 audit[3537]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffc69022070 a2=0 a3=7ffc6902205c items=0 ppid=2950 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.843000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:53:57.850583 env[1706]: time="2024-04-12T18:53:57.850494331Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:57.850583 env[1706]: time="2024-04-12T18:53:57.850559034Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:57.850841 env[1706]: time="2024-04-12T18:53:57.850798578Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:57.851136 env[1706]: time="2024-04-12T18:53:57.851083917Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332 pid=3544 runtime=io.containerd.runc.v2 Apr 12 18:53:57.912386 systemd[1]: run-containerd-runc-k8s.io-dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332-runc.wYr2HP.mount: Deactivated successfully. Apr 12 18:53:57.967670 env[1706]: time="2024-04-12T18:53:57.967081215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:24adaa5d-685e-4833-ab59-91b814d63106,Namespace:default,Attempt:0,} returns sandbox id \"dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332\"" Apr 12 18:53:57.969464 env[1706]: time="2024-04-12T18:53:57.969359712Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Apr 12 18:53:58.591000 audit[3580]: NETFILTER_CFG table=filter:77 family=2 entries=33 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:58.591000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe3fd13590 a2=0 a3=7ffe3fd1357c items=0 ppid=2433 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:58.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:58.595000 audit[3580]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:58.595000 audit[3580]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe3fd13590 a2=0 a3=0 items=0 ppid=2433 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:58.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:58.691452 kubelet[2217]: I0412 18:53:58.691418 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:53:58.779738 kubelet[2217]: E0412 18:53:58.779699 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:58.855728 systemd-networkd[1502]: cali60e51b789ff: Gained IPv6LL Apr 12 18:53:58.908188 kubelet[2217]: I0412 18:53:58.906735 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c-calico-apiserver-certs\") pod \"calico-apiserver-86bdcf54fb-rnp5n\" (UID: \"1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c\") " pod="calico-apiserver/calico-apiserver-86bdcf54fb-rnp5n" Apr 12 18:53:58.908188 kubelet[2217]: I0412 18:53:58.906813 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7r4j\" (UniqueName: \"kubernetes.io/projected/1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c-kube-api-access-z7r4j\") pod \"calico-apiserver-86bdcf54fb-rnp5n\" (UID: \"1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c\") " pod="calico-apiserver/calico-apiserver-86bdcf54fb-rnp5n" Apr 12 18:53:59.016452 kubelet[2217]: E0412 18:53:59.016077 2217 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:53:59.016452 kubelet[2217]: E0412 18:53:59.016214 2217 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c-calico-apiserver-certs podName:1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c nodeName:}" failed. No retries permitted until 2024-04-12 18:53:59.516182488 +0000 UTC m=+40.087806200 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c-calico-apiserver-certs") pod "calico-apiserver-86bdcf54fb-rnp5n" (UID: "1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c") : secret "calico-apiserver-certs" not found Apr 12 18:53:59.607000 audit[3583]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_rule pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:59.607000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffcbbd72050 a2=0 a3=7ffcbbd7203c items=0 ppid=2433 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:59.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:59.608000 audit[3583]: NETFILTER_CFG table=nat:80 family=2 entries=20 op=nft_register_rule pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:59.608000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcbbd72050 a2=0 a3=0 items=0 ppid=2433 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:59.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:59.744470 kubelet[2217]: E0412 18:53:59.744432 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:59.780709 kubelet[2217]: E0412 18:53:59.780669 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:53:59.895830 env[1706]: time="2024-04-12T18:53:59.895727544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86bdcf54fb-rnp5n,Uid:1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:54:00.239881 systemd-networkd[1502]: calid86c047a8b7: Link UP Apr 12 18:54:00.241791 (udev-worker)[3523]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:54:00.251936 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:00.252057 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid86c047a8b7: link becomes ready Apr 12 18:54:00.251045 systemd-networkd[1502]: calid86c047a8b7: Gained carrier Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.096 [INFO][3585] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0 calico-apiserver-86bdcf54fb- calico-apiserver 1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c 1067 0 2024-04-12 18:53:58 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:86bdcf54fb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.31.16.199 calico-apiserver-86bdcf54fb-rnp5n eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid86c047a8b7 [] []}} ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.097 [INFO][3585] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.173 [INFO][3598] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" HandleID="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Workload="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.190 [INFO][3598] ipam_plugin.go 268: Auto assigning IP ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" HandleID="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Workload="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005916d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.16.199", "pod":"calico-apiserver-86bdcf54fb-rnp5n", "timestamp":"2024-04-12 18:54:00.173087041 +0000 UTC"}, Hostname:"172.31.16.199", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.190 [INFO][3598] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.190 [INFO][3598] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.190 [INFO][3598] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.199' Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.193 [INFO][3598] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.199 [INFO][3598] ipam.go 372: Looking up existing affinities for host host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.205 [INFO][3598] ipam.go 489: Trying affinity for 192.168.126.0/26 host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.208 [INFO][3598] ipam.go 155: Attempting to load block cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.212 [INFO][3598] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.212 [INFO][3598] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.0/26 handle="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.214 [INFO][3598] ipam.go 1682: Creating new handle: k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.225 [INFO][3598] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.0/26 handle="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.233 [INFO][3598] ipam.go 1216: Successfully claimed IPs: [192.168.126.4/26] block=192.168.126.0/26 handle="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.233 [INFO][3598] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.4/26] handle="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" host="172.31.16.199" Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.233 [INFO][3598] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:00.287376 env[1706]: 2024-04-12 18:54:00.233 [INFO][3598] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.4/26] IPv6=[] ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" HandleID="k8s-pod-network.e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Workload="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.288512 env[1706]: 2024-04-12 18:54:00.235 [INFO][3585] k8s.go 385: Populated endpoint ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0", GenerateName:"calico-apiserver-86bdcf54fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86bdcf54fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"", Pod:"calico-apiserver-86bdcf54fb-rnp5n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.126.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid86c047a8b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:00.288512 env[1706]: 2024-04-12 18:54:00.236 [INFO][3585] k8s.go 386: Calico CNI using IPs: [192.168.126.4/32] ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.288512 env[1706]: 2024-04-12 18:54:00.236 [INFO][3585] dataplane_linux.go 68: Setting the host side veth name to calid86c047a8b7 ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.288512 env[1706]: 2024-04-12 18:54:00.252 [INFO][3585] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.288512 env[1706]: 2024-04-12 18:54:00.253 [INFO][3585] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0", GenerateName:"calico-apiserver-86bdcf54fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"86bdcf54fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf", Pod:"calico-apiserver-86bdcf54fb-rnp5n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.126.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid86c047a8b7", MAC:"5a:83:74:2d:59:14", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:00.288512 env[1706]: 2024-04-12 18:54:00.284 [INFO][3585] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf" Namespace="calico-apiserver" Pod="calico-apiserver-86bdcf54fb-rnp5n" WorkloadEndpoint="172.31.16.199-k8s-calico--apiserver--86bdcf54fb--rnp5n-eth0" Apr 12 18:54:00.327000 audit[3622]: NETFILTER_CFG table=filter:81 family=2 entries=55 op=nft_register_chain pid=3622 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:00.327000 audit[3622]: SYSCALL arch=c000003e syscall=46 success=yes exit=28952 a0=3 a1=7ffc1d9b44f0 a2=0 a3=7ffc1d9b44dc items=0 ppid=2950 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:00.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:00.357006 env[1706]: time="2024-04-12T18:54:00.356915235Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:00.357177 env[1706]: time="2024-04-12T18:54:00.357031995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:00.357177 env[1706]: time="2024-04-12T18:54:00.357061272Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:00.357309 env[1706]: time="2024-04-12T18:54:00.357275378Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf pid=3629 runtime=io.containerd.runc.v2 Apr 12 18:54:00.454903 env[1706]: time="2024-04-12T18:54:00.454847093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-86bdcf54fb-rnp5n,Uid:1a577a9e-8e42-4a0a-a5fa-eaaaaa3e3b3c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf\"" Apr 12 18:54:00.781265 kubelet[2217]: E0412 18:54:00.781189 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:01.155680 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount594334344.mount: Deactivated successfully. Apr 12 18:54:01.781915 kubelet[2217]: E0412 18:54:01.781855 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:01.984180 amazon-ssm-agent[1681]: 2024-04-12 18:54:01 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Apr 12 18:54:02.031776 systemd-networkd[1502]: calid86c047a8b7: Gained IPv6LL Apr 12 18:54:02.782307 kubelet[2217]: E0412 18:54:02.782224 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:03.783236 kubelet[2217]: E0412 18:54:03.783196 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:04.386368 env[1706]: time="2024-04-12T18:54:04.386318934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:04.389714 env[1706]: time="2024-04-12T18:54:04.389661464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:04.392316 env[1706]: time="2024-04-12T18:54:04.392262387Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:04.395133 env[1706]: time="2024-04-12T18:54:04.395077244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:04.396620 env[1706]: time="2024-04-12T18:54:04.396573933Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Apr 12 18:54:04.398150 env[1706]: time="2024-04-12T18:54:04.398116817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:54:04.399656 env[1706]: time="2024-04-12T18:54:04.399616427Z" level=info msg="CreateContainer within sandbox \"dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Apr 12 18:54:04.418130 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount259946101.mount: Deactivated successfully. Apr 12 18:54:04.430126 env[1706]: time="2024-04-12T18:54:04.430085814Z" level=info msg="CreateContainer within sandbox \"dcf267d27dbb479a7767fe36e8573ebbfb5fb6f5fb3ca7b41221d845a97cf332\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8fc2eefe705b1dc0cbaf45a7dc0fcffbe1506fc7de61058ea464ddeb30d888d5\"" Apr 12 18:54:04.431123 env[1706]: time="2024-04-12T18:54:04.431090368Z" level=info msg="StartContainer for \"8fc2eefe705b1dc0cbaf45a7dc0fcffbe1506fc7de61058ea464ddeb30d888d5\"" Apr 12 18:54:04.508772 env[1706]: time="2024-04-12T18:54:04.508695862Z" level=info msg="StartContainer for \"8fc2eefe705b1dc0cbaf45a7dc0fcffbe1506fc7de61058ea464ddeb30d888d5\" returns successfully" Apr 12 18:54:04.783448 kubelet[2217]: E0412 18:54:04.783396 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:05.289663 kubelet[2217]: I0412 18:54:05.289628 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.8616229020000001 podCreationTimestamp="2024-04-12 18:53:57 +0000 UTC" firstStartedPulling="2024-04-12 18:53:57.969077899 +0000 UTC m=+38.540701606" lastFinishedPulling="2024-04-12 18:54:04.397042081 +0000 UTC m=+44.968665791" observedRunningTime="2024-04-12 18:54:05.288107798 +0000 UTC m=+45.859731517" watchObservedRunningTime="2024-04-12 18:54:05.289587087 +0000 UTC m=+45.861210804" Apr 12 18:54:05.327557 kernel: kauditd_printk_skb: 20 callbacks suppressed Apr 12 18:54:05.327769 kernel: audit: type=1325 audit(1712948045.323:267): table=filter:82 family=2 entries=22 op=nft_register_rule pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:05.323000 audit[3716]: NETFILTER_CFG table=filter:82 family=2 entries=22 op=nft_register_rule pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:05.336811 kernel: audit: type=1300 audit(1712948045.323:267): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff8029c3c0 a2=0 a3=7fff8029c3ac items=0 ppid=2433 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:05.323000 audit[3716]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff8029c3c0 a2=0 a3=7fff8029c3ac items=0 ppid=2433 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:05.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:05.340591 kernel: audit: type=1327 audit(1712948045.323:267): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:05.326000 audit[3716]: NETFILTER_CFG table=nat:83 family=2 entries=104 op=nft_register_chain pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:05.352547 kernel: audit: type=1325 audit(1712948045.326:268): table=nat:83 family=2 entries=104 op=nft_register_chain pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:05.326000 audit[3716]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff8029c3c0 a2=0 a3=7fff8029c3ac items=0 ppid=2433 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:05.378669 kernel: audit: type=1300 audit(1712948045.326:268): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff8029c3c0 a2=0 a3=7fff8029c3ac items=0 ppid=2433 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:05.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:05.383812 kernel: audit: type=1327 audit(1712948045.326:268): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:05.719387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1600439176.mount: Deactivated successfully. Apr 12 18:54:05.784550 kubelet[2217]: E0412 18:54:05.784501 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:06.044735 kernel: audit: type=1325 audit(1712948046.039:269): table=filter:84 family=2 entries=10 op=nft_register_rule pid=3729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:06.039000 audit[3729]: NETFILTER_CFG table=filter:84 family=2 entries=10 op=nft_register_rule pid=3729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:06.039000 audit[3729]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc763899f0 a2=0 a3=7ffc763899dc items=0 ppid=2433 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:06.056912 kernel: audit: type=1300 audit(1712948046.039:269): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc763899f0 a2=0 a3=7ffc763899dc items=0 ppid=2433 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.057033 kernel: audit: type=1327 audit(1712948046.039:269): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:06.052000 audit[3729]: NETFILTER_CFG table=nat:85 family=2 entries=44 op=nft_register_rule pid=3729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:06.052000 audit[3729]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc763899f0 a2=0 a3=7ffc763899dc items=0 ppid=2433 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:06.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:06.062546 kernel: audit: type=1325 audit(1712948046.052:270): table=nat:85 family=2 entries=44 op=nft_register_rule pid=3729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:06.785468 kubelet[2217]: E0412 18:54:06.785395 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:07.417102 env[1706]: time="2024-04-12T18:54:07.417054641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:07.420764 env[1706]: time="2024-04-12T18:54:07.420724405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:07.422873 env[1706]: time="2024-04-12T18:54:07.422819897Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:07.425269 env[1706]: time="2024-04-12T18:54:07.425218047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:07.426654 env[1706]: time="2024-04-12T18:54:07.426614403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:54:07.429383 env[1706]: time="2024-04-12T18:54:07.429348165Z" level=info msg="CreateContainer within sandbox \"e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:54:07.449885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1926054116.mount: Deactivated successfully. Apr 12 18:54:07.463277 env[1706]: time="2024-04-12T18:54:07.463222283Z" level=info msg="CreateContainer within sandbox \"e709bad8184b2c7472021c93db4f34ae9710fad3fcce0241c5145ccede5130cf\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b4cec00b91020e626242ceb51f51e15f6e66e784eb6a9679c8084009a761bf23\"" Apr 12 18:54:07.464035 env[1706]: time="2024-04-12T18:54:07.464002284Z" level=info msg="StartContainer for \"b4cec00b91020e626242ceb51f51e15f6e66e784eb6a9679c8084009a761bf23\"" Apr 12 18:54:07.591553 env[1706]: time="2024-04-12T18:54:07.591312906Z" level=info msg="StartContainer for \"b4cec00b91020e626242ceb51f51e15f6e66e784eb6a9679c8084009a761bf23\" returns successfully" Apr 12 18:54:07.785745 kubelet[2217]: E0412 18:54:07.785681 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:08.295502 kubelet[2217]: I0412 18:54:08.295470 2217 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-86bdcf54fb-rnp5n" podStartSLOduration=3.324845346 podCreationTimestamp="2024-04-12 18:53:58 +0000 UTC" firstStartedPulling="2024-04-12 18:54:00.456448905 +0000 UTC m=+41.028072606" lastFinishedPulling="2024-04-12 18:54:07.427013027 +0000 UTC m=+47.998636737" observedRunningTime="2024-04-12 18:54:08.294072686 +0000 UTC m=+48.865696405" watchObservedRunningTime="2024-04-12 18:54:08.295409477 +0000 UTC m=+48.867033196" Apr 12 18:54:08.319000 audit[3773]: NETFILTER_CFG table=filter:86 family=2 entries=10 op=nft_register_rule pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:08.319000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd54da89d0 a2=0 a3=7ffd54da89bc items=0 ppid=2433 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:08.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:08.323000 audit[3773]: NETFILTER_CFG table=nat:87 family=2 entries=44 op=nft_register_rule pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:08.323000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd54da89d0 a2=0 a3=7ffd54da89bc items=0 ppid=2433 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:08.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:08.786684 kubelet[2217]: E0412 18:54:08.786629 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:09.786998 kubelet[2217]: E0412 18:54:09.786953 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:10.787788 kubelet[2217]: E0412 18:54:10.787734 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:11.788408 kubelet[2217]: E0412 18:54:11.788355 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:12.788726 kubelet[2217]: E0412 18:54:12.788672 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:13.789644 kubelet[2217]: E0412 18:54:13.789595 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:14.790304 kubelet[2217]: E0412 18:54:14.790251 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:15.791240 kubelet[2217]: E0412 18:54:15.791186 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:16.792404 kubelet[2217]: E0412 18:54:16.792281 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:17.792540 kubelet[2217]: E0412 18:54:17.792480 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:18.793737 kubelet[2217]: E0412 18:54:18.793692 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:19.744392 kubelet[2217]: E0412 18:54:19.744338 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:19.753124 env[1706]: time="2024-04-12T18:54:19.753077151Z" level=info msg="StopPodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\"" Apr 12 18:54:19.794390 kubelet[2217]: E0412 18:54:19.794346 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.850 [WARNING][3807] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-csi--node--driver--8578c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9c30d99-d4d5-49ca-a084-f4788f31e668", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf", Pod:"csi-node-driver-8578c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0d2b2163f8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.851 [INFO][3807] k8s.go 585: Cleaning up netns ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.851 [INFO][3807] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" iface="eth0" netns="" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.851 [INFO][3807] k8s.go 592: Releasing IP address(es) ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.851 [INFO][3807] utils.go 188: Calico CNI releasing IP address ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.921 [INFO][3813] ipam_plugin.go 415: Releasing address using handleID ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.921 [INFO][3813] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.921 [INFO][3813] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.930 [WARNING][3813] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.930 [INFO][3813] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.932 [INFO][3813] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:19.939241 env[1706]: 2024-04-12 18:54:19.933 [INFO][3807] k8s.go 598: Teardown processing complete. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:19.941319 env[1706]: time="2024-04-12T18:54:19.939316390Z" level=info msg="TearDown network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" successfully" Apr 12 18:54:19.941319 env[1706]: time="2024-04-12T18:54:19.939355600Z" level=info msg="StopPodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" returns successfully" Apr 12 18:54:19.941458 env[1706]: time="2024-04-12T18:54:19.941419503Z" level=info msg="RemovePodSandbox for \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\"" Apr 12 18:54:19.941541 env[1706]: time="2024-04-12T18:54:19.941464311Z" level=info msg="Forcibly stopping sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\"" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.016 [WARNING][3832] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-csi--node--driver--8578c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9c30d99-d4d5-49ca-a084-f4788f31e668", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"8976e49b56bd670b4d4be44a41919aa530d7fed342e8773aa5fbb480a0273daf", Pod:"csi-node-driver-8578c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0d2b2163f8c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.017 [INFO][3832] k8s.go 585: Cleaning up netns ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.017 [INFO][3832] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" iface="eth0" netns="" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.017 [INFO][3832] k8s.go 592: Releasing IP address(es) ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.017 [INFO][3832] utils.go 188: Calico CNI releasing IP address ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.057 [INFO][3838] ipam_plugin.go 415: Releasing address using handleID ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.057 [INFO][3838] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.057 [INFO][3838] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.069 [WARNING][3838] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.069 [INFO][3838] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" HandleID="k8s-pod-network.2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Workload="172.31.16.199-k8s-csi--node--driver--8578c-eth0" Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.073 [INFO][3838] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:20.076556 env[1706]: 2024-04-12 18:54:20.074 [INFO][3832] k8s.go 598: Teardown processing complete. ContainerID="2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612" Apr 12 18:54:20.076556 env[1706]: time="2024-04-12T18:54:20.075563909Z" level=info msg="TearDown network for sandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" successfully" Apr 12 18:54:20.084185 env[1706]: time="2024-04-12T18:54:20.084102267Z" level=info msg="RemovePodSandbox \"2dab0b1dba224ac78bb23d357553391abae5572740c5c01b0efb2fb5ee409612\" returns successfully" Apr 12 18:54:20.085265 env[1706]: time="2024-04-12T18:54:20.085222764Z" level=info msg="StopPodSandbox for \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\"" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.177 [WARNING][3859] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"cc758947-7343-4961-a7d4-e981d009ed56", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48", Pod:"nginx-deployment-845c78c8b9-xkmr6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4ab53cb2e6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.178 [INFO][3859] k8s.go 585: Cleaning up netns ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.178 [INFO][3859] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" iface="eth0" netns="" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.178 [INFO][3859] k8s.go 592: Releasing IP address(es) ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.178 [INFO][3859] utils.go 188: Calico CNI releasing IP address ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.225 [INFO][3866] ipam_plugin.go 415: Releasing address using handleID ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.226 [INFO][3866] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.226 [INFO][3866] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.235 [WARNING][3866] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.235 [INFO][3866] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.237 [INFO][3866] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:20.240801 env[1706]: 2024-04-12 18:54:20.239 [INFO][3859] k8s.go 598: Teardown processing complete. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.242215 env[1706]: time="2024-04-12T18:54:20.240834699Z" level=info msg="TearDown network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\" successfully" Apr 12 18:54:20.242215 env[1706]: time="2024-04-12T18:54:20.240950072Z" level=info msg="StopPodSandbox for \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\" returns successfully" Apr 12 18:54:20.242215 env[1706]: time="2024-04-12T18:54:20.242177934Z" level=info msg="RemovePodSandbox for \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\"" Apr 12 18:54:20.242457 env[1706]: time="2024-04-12T18:54:20.242214905Z" level=info msg="Forcibly stopping sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\"" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.303 [WARNING][3884] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"cc758947-7343-4961-a7d4-e981d009ed56", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"a2b34464ba4f20bcc80f2ee9c5c2df605fb100f171597f8fef505f625a3fdd48", Pod:"nginx-deployment-845c78c8b9-xkmr6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4ab53cb2e6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.303 [INFO][3884] k8s.go 585: Cleaning up netns ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.303 [INFO][3884] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" iface="eth0" netns="" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.303 [INFO][3884] k8s.go 592: Releasing IP address(es) ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.303 [INFO][3884] utils.go 188: Calico CNI releasing IP address ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.344 [INFO][3890] ipam_plugin.go 415: Releasing address using handleID ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.345 [INFO][3890] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.345 [INFO][3890] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.358 [WARNING][3890] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.358 [INFO][3890] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" HandleID="k8s-pod-network.7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Workload="172.31.16.199-k8s-nginx--deployment--845c78c8b9--xkmr6-eth0" Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.360 [INFO][3890] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:20.364852 env[1706]: 2024-04-12 18:54:20.361 [INFO][3884] k8s.go 598: Teardown processing complete. ContainerID="7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a" Apr 12 18:54:20.364852 env[1706]: time="2024-04-12T18:54:20.363181815Z" level=info msg="TearDown network for sandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\" successfully" Apr 12 18:54:20.368812 env[1706]: time="2024-04-12T18:54:20.368762133Z" level=info msg="RemovePodSandbox \"7b5f541efa74f2f346b8023d0a16984c6024219fcca1b7abf339d9619365d47a\" returns successfully" Apr 12 18:54:20.795274 kubelet[2217]: E0412 18:54:20.795227 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:21.795779 kubelet[2217]: E0412 18:54:21.795728 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:22.796124 kubelet[2217]: E0412 18:54:22.796084 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:23.798137 kubelet[2217]: E0412 18:54:23.798082 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:24.799321 kubelet[2217]: E0412 18:54:24.799210 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:25.800443 kubelet[2217]: E0412 18:54:25.800315 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:26.272202 amazon-ssm-agent[1681]: 2024-04-12 18:54:26 INFO [HealthCheck] HealthCheck reporting agent health. Apr 12 18:54:26.634342 systemd[1]: run-containerd-runc-k8s.io-6462d155da102f3333126893f17d29d6caa43584d5e6a67b430f438fab6cc319-runc.LDnR4T.mount: Deactivated successfully. Apr 12 18:54:26.800599 kubelet[2217]: E0412 18:54:26.800534 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:27.801116 kubelet[2217]: E0412 18:54:27.801064 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:28.801938 kubelet[2217]: E0412 18:54:28.801883 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:29.668045 kubelet[2217]: I0412 18:54:29.667996 2217 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:54:29.802595 kubelet[2217]: E0412 18:54:29.802549 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:29.838577 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 18:54:29.838732 kernel: audit: type=1325 audit(1712948069.834:273): table=filter:88 family=2 entries=9 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:29.834000 audit[3934]: NETFILTER_CFG table=filter:88 family=2 entries=9 op=nft_register_rule pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:29.834000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdff189410 a2=0 a3=7ffdff1893fc items=0 ppid=2433 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:29.851053 kubelet[2217]: I0412 18:54:29.850501 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-79ea28b4-3d9a-445a-b200-bb256494124f\" (UniqueName: \"kubernetes.io/nfs/d311ffad-6f20-4201-8f58-5f84cbf31dd5-pvc-79ea28b4-3d9a-445a-b200-bb256494124f\") pod \"test-pod-1\" (UID: \"d311ffad-6f20-4201-8f58-5f84cbf31dd5\") " pod="default/test-pod-1" Apr 12 18:54:29.851753 kubelet[2217]: I0412 18:54:29.851506 2217 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nmh7g\" (UniqueName: \"kubernetes.io/projected/d311ffad-6f20-4201-8f58-5f84cbf31dd5-kube-api-access-nmh7g\") pod \"test-pod-1\" (UID: \"d311ffad-6f20-4201-8f58-5f84cbf31dd5\") " pod="default/test-pod-1" Apr 12 18:54:29.867885 kernel: audit: type=1300 audit(1712948069.834:273): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdff189410 a2=0 a3=7ffdff1893fc items=0 ppid=2433 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:29.868008 kernel: audit: type=1327 audit(1712948069.834:273): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:29.834000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:29.837000 audit[3934]: NETFILTER_CFG table=nat:89 family=2 entries=51 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:29.837000 audit[3934]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffdff189410 a2=0 a3=7ffdff1893fc items=0 ppid=2433 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:29.905786 kernel: audit: type=1325 audit(1712948069.837:274): table=nat:89 family=2 entries=51 op=nft_register_chain pid=3934 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:29.906000 kernel: audit: type=1300 audit(1712948069.837:274): arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffdff189410 a2=0 a3=7ffdff1893fc items=0 ppid=2433 pid=3934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:29.906085 kernel: audit: type=1327 audit(1712948069.837:274): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:29.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:30.043008 kernel: Failed to create system directory netfs Apr 12 18:54:30.043144 kernel: audit: type=1400 audit(1712948070.035:275): avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.043178 kernel: Failed to create system directory netfs Apr 12 18:54:30.043227 kernel: audit: type=1400 audit(1712948070.035:275): avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.035000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.035000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.057248 kernel: Failed to create system directory netfs Apr 12 18:54:30.057381 kernel: audit: type=1400 audit(1712948070.035:275): avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.057414 kernel: Failed to create system directory netfs Apr 12 18:54:30.035000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.035000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.059000 audit[3960]: NETFILTER_CFG table=filter:90 family=2 entries=8 op=nft_register_rule pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:30.059000 audit[3960]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe6c31b750 a2=0 a3=7ffe6c31b73c items=0 ppid=2433 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:30.065636 kernel: audit: type=1400 audit(1712948070.035:275): avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.035000 audit[3958]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56321ccb65e0 a1=153bc a2=56321c0c02b0 a3=5 items=0 ppid=1753 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.035000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:54:30.071000 audit[3960]: NETFILTER_CFG table=nat:91 family=2 entries=58 op=nft_register_chain pid=3960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:30.071000 audit[3960]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffe6c31b750 a2=0 a3=7ffe6c31b73c items=0 ppid=2433 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.083246 kernel: Failed to create system directory fscache Apr 12 18:54:30.083371 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.084791 kernel: Failed to create system directory fscache Apr 12 18:54:30.084881 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.087096 kernel: Failed to create system directory fscache Apr 12 18:54:30.087172 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.090758 kernel: Failed to create system directory fscache Apr 12 18:54:30.090847 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.091930 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.095218 kernel: Failed to create system directory fscache Apr 12 18:54:30.095289 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.097425 kernel: Failed to create system directory fscache Apr 12 18:54:30.098005 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.076000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.100892 kernel: Failed to create system directory fscache Apr 12 18:54:30.076000 audit[3958]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56321cecb9c0 a1=4c0fc a2=56321c0c02b0 a3=5 items=0 ppid=1753 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.076000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:54:30.103577 kernel: FS-Cache: Loaded Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.147079 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.147153 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.148290 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.149418 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.151810 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.151861 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.151902 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.153976 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.154011 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.156169 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.156213 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.158566 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.162167 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.162230 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.162261 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.163500 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.167203 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.167271 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.167312 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.169952 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.170016 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.172818 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.172927 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.175936 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.176119 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.178775 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.178859 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.180253 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.182639 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.182735 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.187947 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.188006 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.188053 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.190509 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.190608 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.193172 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.193235 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.195471 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.195535 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.197844 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.197900 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.200063 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.200119 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.202188 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.202266 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.209748 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.209907 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.217850 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.217959 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.219682 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.227218 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.227321 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.237503 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.237573 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.245230 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.245354 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.254038 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.254173 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.254205 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.258573 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.258848 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.258961 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.258993 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.267022 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.267135 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.272053 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.272190 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.276071 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.276123 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.278410 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.278474 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.280537 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.280573 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.282719 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.282779 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.284808 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.284848 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.287291 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.287352 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.289398 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.289438 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.290538 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.292657 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.292760 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.299272 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.299381 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.299410 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.299434 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.299459 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.301424 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.301490 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.303584 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.303632 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.305666 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.305706 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.307807 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.307865 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.310027 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.310086 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.311212 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.313494 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.313560 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.315650 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.315692 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.318026 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.318099 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.320202 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.320240 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.322372 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.322414 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.324453 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.324498 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.326573 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.326623 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.328604 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.328638 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.331168 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.331211 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.335018 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.335097 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.335132 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.337051 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.337159 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.340411 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.340471 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.129000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.342528 kernel: Failed to create system directory sunrpc Apr 12 18:54:30.352731 kernel: RPC: Registered named UNIX socket transport module. Apr 12 18:54:30.352858 kernel: RPC: Registered udp transport module. Apr 12 18:54:30.352896 kernel: RPC: Registered tcp transport module. Apr 12 18:54:30.353703 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Apr 12 18:54:30.129000 audit[3958]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56321cf17ad0 a1=1a7e9c a2=56321c0c02b0 a3=5 items=6 ppid=1753 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.129000 audit: CWD cwd="/" Apr 12 18:54:30.129000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:30.129000 audit: PATH item=1 name=(null) inode=24646 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:30.129000 audit: PATH item=2 name=(null) inode=24646 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:30.129000 audit: PATH item=3 name=(null) inode=24647 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:30.129000 audit: PATH item=4 name=(null) inode=24646 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:30.129000 audit: PATH item=5 name=(null) inode=24648 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:30.129000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.408585 kernel: Failed to create system directory nfs Apr 12 18:54:30.408669 kernel: Failed to create system directory nfs Apr 12 18:54:30.408697 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.410908 kernel: Failed to create system directory nfs Apr 12 18:54:30.410984 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.413079 kernel: Failed to create system directory nfs Apr 12 18:54:30.413149 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.415070 kernel: Failed to create system directory nfs Apr 12 18:54:30.415107 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.417175 kernel: Failed to create system directory nfs Apr 12 18:54:30.417231 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.419173 kernel: Failed to create system directory nfs Apr 12 18:54:30.419210 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.420855 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.422531 kernel: Failed to create system directory nfs Apr 12 18:54:30.422583 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.423553 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.425553 kernel: Failed to create system directory nfs Apr 12 18:54:30.425588 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.429622 kernel: Failed to create system directory nfs Apr 12 18:54:30.429701 kernel: Failed to create system directory nfs Apr 12 18:54:30.429775 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.431305 kernel: Failed to create system directory nfs Apr 12 18:54:30.431346 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.433301 kernel: Failed to create system directory nfs Apr 12 18:54:30.433339 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.435495 kernel: Failed to create system directory nfs Apr 12 18:54:30.435551 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.437969 kernel: Failed to create system directory nfs Apr 12 18:54:30.438033 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.440009 kernel: Failed to create system directory nfs Apr 12 18:54:30.440046 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.442000 kernel: Failed to create system directory nfs Apr 12 18:54:30.442036 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.443016 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.444989 kernel: Failed to create system directory nfs Apr 12 18:54:30.445023 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.447011 kernel: Failed to create system directory nfs Apr 12 18:54:30.447046 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.449024 kernel: Failed to create system directory nfs Apr 12 18:54:30.449060 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.451043 kernel: Failed to create system directory nfs Apr 12 18:54:30.451088 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.453403 kernel: Failed to create system directory nfs Apr 12 18:54:30.453479 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.455442 kernel: Failed to create system directory nfs Apr 12 18:54:30.455479 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.457407 kernel: Failed to create system directory nfs Apr 12 18:54:30.457454 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.459663 kernel: Failed to create system directory nfs Apr 12 18:54:30.459702 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.461820 kernel: Failed to create system directory nfs Apr 12 18:54:30.461866 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.463746 kernel: Failed to create system directory nfs Apr 12 18:54:30.463783 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.465732 kernel: Failed to create system directory nfs Apr 12 18:54:30.465768 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.467770 kernel: Failed to create system directory nfs Apr 12 18:54:30.467806 kernel: Failed to create system directory nfs Apr 12 18:54:30.394000 audit[3958]: AVC avc: denied { confidentiality } for pid=3958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.490638 kernel: FS-Cache: Netfs 'nfs' registered for caching Apr 12 18:54:30.394000 audit[3958]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56321d138670 a1=16d85c a2=56321c0c02b0 a3=5 items=0 ppid=1753 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.394000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.563795 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.563943 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.563974 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.563998 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.564021 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.564044 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.564067 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.565924 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.565974 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.568316 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.568391 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.570481 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.570558 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.572742 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.572790 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.574959 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.575011 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.577029 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.577068 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.579364 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.579415 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.581508 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.581576 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.583710 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.583789 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.585783 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.585823 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.587824 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.587863 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.591238 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.591317 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.593692 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.593763 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.595643 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.595709 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.597695 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.597732 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.599794 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.599834 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.602943 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.603036 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.605148 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.605193 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.607205 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.607257 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.609461 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.609513 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.610578 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.612699 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.612743 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.614730 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.614767 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.616798 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.616874 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.618803 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.618840 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.620880 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.620928 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.622951 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.622992 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.625004 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.625047 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.627026 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.627060 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.629673 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.629910 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.632432 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.632530 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.634431 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.634465 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.637457 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.637497 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.639672 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.639765 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.640689 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.642842 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.642904 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.644860 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.644896 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.647003 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.647047 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.649131 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.649208 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.651262 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.651302 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.653284 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.653323 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.655286 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.655321 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.657291 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.657327 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.659316 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.659353 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.528000 audit[3965]: AVC avc: denied { confidentiality } for pid=3965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.662218 kernel: Failed to create system directory nfs4 Apr 12 18:54:30.801753 kernel: NFS: Registering the id_resolver key type Apr 12 18:54:30.801895 kernel: Key type id_resolver registered Apr 12 18:54:30.801925 kernel: Key type id_legacy registered Apr 12 18:54:30.528000 audit[3965]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f205fed6010 a1=208ac4 a2=55bfb385d2b0 a3=5 items=0 ppid=1753 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.528000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Apr 12 18:54:30.804918 kubelet[2217]: E0412 18:54:30.804889 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.824562 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.824681 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.824711 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.824761 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.824795 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.824826 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.825922 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.828022 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.828184 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.830603 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.830702 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.832704 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.832762 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.834791 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.834847 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.836868 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.836931 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.839040 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.839102 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.840149 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.842547 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.843694 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.845027 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.847550 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.847613 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.814000 audit[3966]: AVC avc: denied { confidentiality } for pid=3966 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Apr 12 18:54:30.849917 kernel: Failed to create system directory rpcgss Apr 12 18:54:30.814000 audit[3966]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f485c23a010 a1=70c3c a2=561cdeeee2b0 a3=5 items=0 ppid=1753 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.814000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Apr 12 18:54:30.877141 nfsidmap[3974]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Apr 12 18:54:30.881229 nfsidmap[3975]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' Apr 12 18:54:30.896000 audit[1926]: AVC avc: denied { watch_reads } for pid=1926 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:54:30.896000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=563f6c898a10 a2=10 a3=1df46db4951e9833 items=0 ppid=1 pid=1926 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.896000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:54:30.896000 audit[1926]: AVC avc: denied { watch_reads } for pid=1926 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:54:30.896000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=563f6c898a10 a2=10 a3=1df46db4951e9833 items=0 ppid=1 pid=1926 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.896000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:54:30.896000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:54:30.896000 audit[1926]: AVC avc: denied { watch_reads } for pid=1926 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:54:30.896000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=563f6c898a10 a2=10 a3=1df46db4951e9833 items=0 ppid=1 pid=1926 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:30.896000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Apr 12 18:54:30.896000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:54:30.896000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2726 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Apr 12 18:54:31.175673 env[1706]: time="2024-04-12T18:54:31.173165383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d311ffad-6f20-4201-8f58-5f84cbf31dd5,Namespace:default,Attempt:0,}" Apr 12 18:54:31.404487 (udev-worker)[3970]: Network interface NamePolicy= disabled on kernel command line. Apr 12 18:54:31.405487 systemd-networkd[1502]: cali5ec59c6bf6e: Link UP Apr 12 18:54:31.411333 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:31.411797 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Apr 12 18:54:31.411824 systemd-networkd[1502]: cali5ec59c6bf6e: Gained carrier Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.260 [INFO][3977] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.16.199-k8s-test--pod--1-eth0 default d311ffad-6f20-4201-8f58-5f84cbf31dd5 1189 0 2024-04-12 18:53:58 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.16.199 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.260 [INFO][3977] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.305 [INFO][3987] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" HandleID="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Workload="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.325 [INFO][3987] ipam_plugin.go 268: Auto assigning IP ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" HandleID="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Workload="172.31.16.199-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000281960), Attrs:map[string]string{"namespace":"default", "node":"172.31.16.199", "pod":"test-pod-1", "timestamp":"2024-04-12 18:54:31.305690928 +0000 UTC"}, Hostname:"172.31.16.199", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.325 [INFO][3987] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.325 [INFO][3987] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.325 [INFO][3987] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.16.199' Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.329 [INFO][3987] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.345 [INFO][3987] ipam.go 372: Looking up existing affinities for host host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.351 [INFO][3987] ipam.go 489: Trying affinity for 192.168.126.0/26 host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.353 [INFO][3987] ipam.go 155: Attempting to load block cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.356 [INFO][3987] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.0/26 host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.356 [INFO][3987] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.0/26 handle="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.360 [INFO][3987] ipam.go 1682: Creating new handle: k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513 Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.364 [INFO][3987] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.0/26 handle="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.395 [INFO][3987] ipam.go 1216: Successfully claimed IPs: [192.168.126.5/26] block=192.168.126.0/26 handle="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.395 [INFO][3987] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.5/26] handle="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" host="172.31.16.199" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.395 [INFO][3987] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.395 [INFO][3987] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.5/26] IPv6=[] ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" HandleID="k8s-pod-network.dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Workload="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.399 [INFO][3977] k8s.go 385: Populated endpoint ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d311ffad-6f20-4201-8f58-5f84cbf31dd5", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.444370 env[1706]: 2024-04-12 18:54:31.399 [INFO][3977] k8s.go 386: Calico CNI using IPs: [192.168.126.5/32] ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.445926 env[1706]: 2024-04-12 18:54:31.399 [INFO][3977] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.445926 env[1706]: 2024-04-12 18:54:31.413 [INFO][3977] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.445926 env[1706]: 2024-04-12 18:54:31.414 [INFO][3977] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.16.199-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d311ffad-6f20-4201-8f58-5f84cbf31dd5", ResourceVersion:"1189", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.16.199", ContainerID:"dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c6:ff:5d:4c:b5:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.445926 env[1706]: 2024-04-12 18:54:31.440 [INFO][3977] k8s.go 498: Wrote updated endpoint to datastore ContainerID="dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.16.199-k8s-test--pod--1-eth0" Apr 12 18:54:31.485000 audit[4011]: NETFILTER_CFG table=filter:92 family=2 entries=42 op=nft_register_chain pid=4011 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:31.485000 audit[4011]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffc14593dc0 a2=0 a3=7ffc14593dac items=0 ppid=2950 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.485000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:31.489242 env[1706]: time="2024-04-12T18:54:31.489152317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:31.489962 env[1706]: time="2024-04-12T18:54:31.489454554Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:31.490214 env[1706]: time="2024-04-12T18:54:31.490015357Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:31.490636 env[1706]: time="2024-04-12T18:54:31.490484379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513 pid=4014 runtime=io.containerd.runc.v2 Apr 12 18:54:31.598307 env[1706]: time="2024-04-12T18:54:31.598261619Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d311ffad-6f20-4201-8f58-5f84cbf31dd5,Namespace:default,Attempt:0,} returns sandbox id \"dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513\"" Apr 12 18:54:31.601343 env[1706]: time="2024-04-12T18:54:31.601305062Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Apr 12 18:54:31.805492 kubelet[2217]: E0412 18:54:31.805425 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:31.907072 env[1706]: time="2024-04-12T18:54:31.907025434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.912354 env[1706]: time="2024-04-12T18:54:31.912304418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.915225 env[1706]: time="2024-04-12T18:54:31.915182127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.917988 env[1706]: time="2024-04-12T18:54:31.917950075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:c55d27e57a0d92ca01e7aba1a1812f9c8cc73708ce69fb58d4a42b6416a95f38,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.918757 env[1706]: time="2024-04-12T18:54:31.918721334Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7f0fd59e009436c3043ced784dce0efbc915d6479724090257ed5c8d7f7ece83\"" Apr 12 18:54:31.922612 env[1706]: time="2024-04-12T18:54:31.922564167Z" level=info msg="CreateContainer within sandbox \"dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513\" for container &ContainerMetadata{Name:test,Attempt:0,}" Apr 12 18:54:31.949134 env[1706]: time="2024-04-12T18:54:31.949085293Z" level=info msg="CreateContainer within sandbox \"dac4b5337b3a5473c5ca63729eea4a2a48674c74109ed723af91ada56743c513\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c45dfc42e7459e25897854e601feff7378347f4369632ad3a300792253195758\"" Apr 12 18:54:31.949830 env[1706]: time="2024-04-12T18:54:31.949743455Z" level=info msg="StartContainer for \"c45dfc42e7459e25897854e601feff7378347f4369632ad3a300792253195758\"" Apr 12 18:54:32.057027 env[1706]: time="2024-04-12T18:54:32.056557613Z" level=info msg="StartContainer for \"c45dfc42e7459e25897854e601feff7378347f4369632ad3a300792253195758\" returns successfully" Apr 12 18:54:32.197497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2879844818.mount: Deactivated successfully. Apr 12 18:54:32.520361 systemd-networkd[1502]: cali5ec59c6bf6e: Gained IPv6LL Apr 12 18:54:32.806687 kubelet[2217]: E0412 18:54:32.806550 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:33.806766 kubelet[2217]: E0412 18:54:33.806726 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:34.807384 kubelet[2217]: E0412 18:54:34.807328 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:35.808035 kubelet[2217]: E0412 18:54:35.807980 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:36.808593 kubelet[2217]: E0412 18:54:36.808465 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:37.809096 kubelet[2217]: E0412 18:54:37.809043 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:38.810070 kubelet[2217]: E0412 18:54:38.810001 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:39.745263 kubelet[2217]: E0412 18:54:39.745215 2217 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:39.810512 kubelet[2217]: E0412 18:54:39.810454 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:40.811358 kubelet[2217]: E0412 18:54:40.811304 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:41.811469 kubelet[2217]: E0412 18:54:41.811412 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:42.812331 kubelet[2217]: E0412 18:54:42.812291 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:43.814724 kubelet[2217]: E0412 18:54:43.814684 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:44.815318 kubelet[2217]: E0412 18:54:44.815276 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:45.816217 kubelet[2217]: E0412 18:54:45.816089 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:46.816655 kubelet[2217]: E0412 18:54:46.816598 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:47.817475 kubelet[2217]: E0412 18:54:47.817419 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:48.818047 kubelet[2217]: E0412 18:54:48.817986 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:49.818500 kubelet[2217]: E0412 18:54:49.818449 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:50.819077 kubelet[2217]: E0412 18:54:50.819023 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:51.819544 kubelet[2217]: E0412 18:54:51.819485 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:52.820098 kubelet[2217]: E0412 18:54:52.820057 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:53.820872 kubelet[2217]: E0412 18:54:53.820820 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:54.821647 kubelet[2217]: E0412 18:54:54.821596 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:55.822542 kubelet[2217]: E0412 18:54:55.822475 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:56.637682 systemd[1]: run-containerd-runc-k8s.io-6462d155da102f3333126893f17d29d6caa43584d5e6a67b430f438fab6cc319-runc.8w1IvB.mount: Deactivated successfully. Apr 12 18:54:56.822699 kubelet[2217]: E0412 18:54:56.822627 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Apr 12 18:54:57.823777 kubelet[2217]: E0412 18:54:57.823719 2217 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"