May 17 00:37:04.085061 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:37:04.085090 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:37:04.085106 kernel: BIOS-provided physical RAM map: May 17 00:37:04.085116 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:37:04.085125 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 17 00:37:04.085135 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:37:04.085146 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:37:04.085156 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:37:04.085168 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:37:04.085178 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:37:04.085187 kernel: NX (Execute Disable) protection: active May 17 00:37:04.085197 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:37:04.085207 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 17 00:37:04.085216 kernel: extended physical RAM map: May 17 00:37:04.085231 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:37:04.085241 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 17 00:37:04.085251 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 17 00:37:04.085262 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 17 00:37:04.085272 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 17 00:37:04.085282 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 17 00:37:04.085291 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 17 00:37:04.085300 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 17 00:37:04.085310 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 17 00:37:04.085320 kernel: efi: EFI v2.70 by EDK II May 17 00:37:04.085335 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 17 00:37:04.085347 kernel: SMBIOS 2.7 present. May 17 00:37:04.085359 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 17 00:37:04.085371 kernel: Hypervisor detected: KVM May 17 00:37:04.085384 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:37:04.085396 kernel: kvm-clock: cpu 0, msr 2819a001, primary cpu clock May 17 00:37:04.085420 kernel: kvm-clock: using sched offset of 5068957803 cycles May 17 00:37:04.085433 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:37:04.085446 kernel: tsc: Detected 2499.998 MHz processor May 17 00:37:04.085459 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:37:04.085472 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:37:04.085488 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 17 00:37:04.085500 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:37:04.085513 kernel: Using GB pages for direct mapping May 17 00:37:04.085526 kernel: Secure boot disabled May 17 00:37:04.085539 kernel: ACPI: Early table checksum verification disabled May 17 00:37:04.085558 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 17 00:37:04.085572 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 17 00:37:04.085589 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 17 00:37:04.085603 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 17 00:37:04.085617 kernel: ACPI: FACS 0x00000000789D0000 000040 May 17 00:37:04.085632 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 17 00:37:04.085646 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 17 00:37:04.085660 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 17 00:37:04.085673 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 17 00:37:04.085690 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 17 00:37:04.085705 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:37:04.085719 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 17 00:37:04.085733 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 17 00:37:04.085747 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 17 00:37:04.085761 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 17 00:37:04.085775 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 17 00:37:04.085789 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 17 00:37:04.085804 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 17 00:37:04.085820 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 17 00:37:04.085834 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 17 00:37:04.085848 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 17 00:37:04.085862 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 17 00:37:04.085876 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 17 00:37:04.085891 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 17 00:37:04.085904 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 17 00:37:04.085918 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 17 00:37:04.085932 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 17 00:37:04.085947 kernel: NUMA: Initialized distance table, cnt=1 May 17 00:37:04.085961 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 17 00:37:04.085976 kernel: Zone ranges: May 17 00:37:04.085990 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:37:04.086003 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 17 00:37:04.086017 kernel: Normal empty May 17 00:37:04.086031 kernel: Movable zone start for each node May 17 00:37:04.086045 kernel: Early memory node ranges May 17 00:37:04.086059 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:37:04.086076 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 17 00:37:04.086090 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 17 00:37:04.086104 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 17 00:37:04.086119 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:37:04.086133 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:37:04.086147 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 17 00:37:04.086161 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 17 00:37:04.086175 kernel: ACPI: PM-Timer IO Port: 0xb008 May 17 00:37:04.086189 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:37:04.086206 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 17 00:37:04.086220 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:37:04.086234 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:37:04.086248 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:37:04.086263 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:37:04.086276 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:37:04.086288 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:37:04.086299 kernel: TSC deadline timer available May 17 00:37:04.086310 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 17 00:37:04.086325 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 17 00:37:04.086335 kernel: Booting paravirtualized kernel on KVM May 17 00:37:04.086348 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:37:04.086359 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 17 00:37:04.086371 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 17 00:37:04.086382 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 17 00:37:04.086393 kernel: pcpu-alloc: [0] 0 1 May 17 00:37:04.096473 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 17 00:37:04.096503 kernel: kvm-guest: PV spinlocks enabled May 17 00:37:04.096523 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:37:04.096536 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 17 00:37:04.096550 kernel: Policy zone: DMA32 May 17 00:37:04.096566 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:37:04.096580 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:37:04.096593 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:37:04.096606 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 17 00:37:04.096620 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:37:04.096636 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 160904K reserved, 0K cma-reserved) May 17 00:37:04.096650 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 17 00:37:04.096663 kernel: Kernel/User page tables isolation: enabled May 17 00:37:04.096676 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:37:04.096689 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:37:04.096702 kernel: rcu: Hierarchical RCU implementation. May 17 00:37:04.096716 kernel: rcu: RCU event tracing is enabled. May 17 00:37:04.096743 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 17 00:37:04.096758 kernel: Rude variant of Tasks RCU enabled. May 17 00:37:04.096772 kernel: Tracing variant of Tasks RCU enabled. May 17 00:37:04.096786 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:37:04.096800 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 17 00:37:04.096817 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 17 00:37:04.096829 kernel: random: crng init done May 17 00:37:04.096843 kernel: Console: colour dummy device 80x25 May 17 00:37:04.096857 kernel: printk: console [tty0] enabled May 17 00:37:04.096871 kernel: printk: console [ttyS0] enabled May 17 00:37:04.096885 kernel: ACPI: Core revision 20210730 May 17 00:37:04.096898 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 17 00:37:04.096916 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:37:04.096931 kernel: x2apic enabled May 17 00:37:04.096944 kernel: Switched APIC routing to physical x2apic. May 17 00:37:04.096958 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 17 00:37:04.096971 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) May 17 00:37:04.096985 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 17 00:37:04.097000 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 17 00:37:04.097017 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:37:04.097031 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:37:04.097044 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:37:04.097057 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 17 00:37:04.097072 kernel: RETBleed: Vulnerable May 17 00:37:04.097085 kernel: Speculative Store Bypass: Vulnerable May 17 00:37:04.097098 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:37:04.097112 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 17 00:37:04.097125 kernel: GDS: Unknown: Dependent on hypervisor status May 17 00:37:04.097141 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:37:04.097154 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:37:04.097171 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:37:04.097183 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 17 00:37:04.097196 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 17 00:37:04.097208 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 17 00:37:04.097221 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 17 00:37:04.097233 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 17 00:37:04.097247 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 17 00:37:04.097260 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:37:04.097273 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 17 00:37:04.097287 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 17 00:37:04.097305 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 17 00:37:04.097318 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 17 00:37:04.097331 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 17 00:37:04.097345 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 17 00:37:04.097358 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 17 00:37:04.097372 kernel: Freeing SMP alternatives memory: 32K May 17 00:37:04.097386 kernel: pid_max: default: 32768 minimum: 301 May 17 00:37:04.097399 kernel: LSM: Security Framework initializing May 17 00:37:04.097438 kernel: SELinux: Initializing. May 17 00:37:04.097450 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:37:04.097470 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 17 00:37:04.097481 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 17 00:37:04.097497 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 17 00:37:04.097510 kernel: signal: max sigframe size: 3632 May 17 00:37:04.097524 kernel: rcu: Hierarchical SRCU implementation. May 17 00:37:04.097538 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 17 00:37:04.097550 kernel: smp: Bringing up secondary CPUs ... May 17 00:37:04.097566 kernel: x86: Booting SMP configuration: May 17 00:37:04.097579 kernel: .... node #0, CPUs: #1 May 17 00:37:04.097593 kernel: kvm-clock: cpu 1, msr 2819a041, secondary cpu clock May 17 00:37:04.097608 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 17 00:37:04.097628 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 17 00:37:04.097640 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 17 00:37:04.097653 kernel: smp: Brought up 1 node, 2 CPUs May 17 00:37:04.097668 kernel: smpboot: Max logical packages: 1 May 17 00:37:04.097681 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) May 17 00:37:04.097695 kernel: devtmpfs: initialized May 17 00:37:04.097708 kernel: x86/mm: Memory block size: 128MB May 17 00:37:04.097720 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 17 00:37:04.097733 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:37:04.097750 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 17 00:37:04.097763 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:37:04.097778 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:37:04.097793 kernel: audit: initializing netlink subsys (disabled) May 17 00:37:04.097806 kernel: audit: type=2000 audit(1747442223.571:1): state=initialized audit_enabled=0 res=1 May 17 00:37:04.097819 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:37:04.097832 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:37:04.097846 kernel: cpuidle: using governor menu May 17 00:37:04.097861 kernel: ACPI: bus type PCI registered May 17 00:37:04.097879 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:37:04.097894 kernel: dca service started, version 1.12.1 May 17 00:37:04.097909 kernel: PCI: Using configuration type 1 for base access May 17 00:37:04.097923 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:37:04.097938 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:37:04.097954 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:37:04.097969 kernel: ACPI: Added _OSI(Module Device) May 17 00:37:04.097984 kernel: ACPI: Added _OSI(Processor Device) May 17 00:37:04.097999 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:37:04.098016 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:37:04.098031 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:37:04.098046 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:37:04.098061 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:37:04.098076 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 17 00:37:04.098091 kernel: ACPI: Interpreter enabled May 17 00:37:04.098106 kernel: ACPI: PM: (supports S0 S5) May 17 00:37:04.098120 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:37:04.098135 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:37:04.098152 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 17 00:37:04.098165 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:37:04.098375 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 17 00:37:04.098537 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 17 00:37:04.098556 kernel: acpiphp: Slot [3] registered May 17 00:37:04.098570 kernel: acpiphp: Slot [4] registered May 17 00:37:04.098585 kernel: acpiphp: Slot [5] registered May 17 00:37:04.098605 kernel: acpiphp: Slot [6] registered May 17 00:37:04.098624 kernel: acpiphp: Slot [7] registered May 17 00:37:04.098640 kernel: acpiphp: Slot [8] registered May 17 00:37:04.098657 kernel: acpiphp: Slot [9] registered May 17 00:37:04.098671 kernel: acpiphp: Slot [10] registered May 17 00:37:04.098687 kernel: acpiphp: Slot [11] registered May 17 00:37:04.098704 kernel: acpiphp: Slot [12] registered May 17 00:37:04.098718 kernel: acpiphp: Slot [13] registered May 17 00:37:04.098732 kernel: acpiphp: Slot [14] registered May 17 00:37:04.098747 kernel: acpiphp: Slot [15] registered May 17 00:37:04.098765 kernel: acpiphp: Slot [16] registered May 17 00:37:04.098779 kernel: acpiphp: Slot [17] registered May 17 00:37:04.098795 kernel: acpiphp: Slot [18] registered May 17 00:37:04.098810 kernel: acpiphp: Slot [19] registered May 17 00:37:04.098826 kernel: acpiphp: Slot [20] registered May 17 00:37:04.098842 kernel: acpiphp: Slot [21] registered May 17 00:37:04.098858 kernel: acpiphp: Slot [22] registered May 17 00:37:04.098873 kernel: acpiphp: Slot [23] registered May 17 00:37:04.098888 kernel: acpiphp: Slot [24] registered May 17 00:37:04.098907 kernel: acpiphp: Slot [25] registered May 17 00:37:04.098923 kernel: acpiphp: Slot [26] registered May 17 00:37:04.098938 kernel: acpiphp: Slot [27] registered May 17 00:37:04.098953 kernel: acpiphp: Slot [28] registered May 17 00:37:04.098969 kernel: acpiphp: Slot [29] registered May 17 00:37:04.098985 kernel: acpiphp: Slot [30] registered May 17 00:37:04.099000 kernel: acpiphp: Slot [31] registered May 17 00:37:04.099015 kernel: PCI host bridge to bus 0000:00 May 17 00:37:04.099163 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:37:04.099304 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:37:04.103365 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:37:04.103584 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 17 00:37:04.103710 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 17 00:37:04.103828 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:37:04.103999 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 17 00:37:04.104912 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 17 00:37:04.105068 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 17 00:37:04.105196 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 17 00:37:04.105319 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 17 00:37:04.105467 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 17 00:37:04.105590 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 17 00:37:04.105713 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 17 00:37:04.105841 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 17 00:37:04.105962 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 17 00:37:04.106092 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 17 00:37:04.106215 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 17 00:37:04.106336 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 17 00:37:04.106475 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 17 00:37:04.106596 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:37:04.106732 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 17 00:37:04.106854 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 17 00:37:04.106983 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 17 00:37:04.107105 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 17 00:37:04.107124 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:37:04.107139 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:37:04.107154 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:37:04.107174 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:37:04.107189 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 17 00:37:04.107204 kernel: iommu: Default domain type: Translated May 17 00:37:04.107219 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:37:04.107340 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 17 00:37:04.113677 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:37:04.113854 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 17 00:37:04.113876 kernel: vgaarb: loaded May 17 00:37:04.113899 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:37:04.113915 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:37:04.113930 kernel: PTP clock support registered May 17 00:37:04.113945 kernel: Registered efivars operations May 17 00:37:04.113960 kernel: PCI: Using ACPI for IRQ routing May 17 00:37:04.113976 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:37:04.113991 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 17 00:37:04.114006 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 17 00:37:04.114020 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 17 00:37:04.114036 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 17 00:37:04.114053 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 17 00:37:04.114068 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:37:04.114083 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:37:04.114099 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:37:04.114114 kernel: pnp: PnP ACPI init May 17 00:37:04.114129 kernel: pnp: PnP ACPI: found 5 devices May 17 00:37:04.114144 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:37:04.114159 kernel: NET: Registered PF_INET protocol family May 17 00:37:04.114174 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:37:04.114192 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 17 00:37:04.114207 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:37:04.114222 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 17 00:37:04.114237 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 17 00:37:04.114252 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 17 00:37:04.114268 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:37:04.114283 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 17 00:37:04.114298 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:37:04.114315 kernel: NET: Registered PF_XDP protocol family May 17 00:37:04.114453 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:37:04.114559 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:37:04.114667 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:37:04.114793 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 17 00:37:04.114925 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 17 00:37:04.115075 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 17 00:37:04.115202 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 17 00:37:04.115227 kernel: PCI: CLS 0 bytes, default 64 May 17 00:37:04.115241 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 17 00:37:04.115255 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns May 17 00:37:04.115269 kernel: clocksource: Switched to clocksource tsc May 17 00:37:04.115283 kernel: Initialise system trusted keyrings May 17 00:37:04.115297 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 17 00:37:04.115310 kernel: Key type asymmetric registered May 17 00:37:04.115324 kernel: Asymmetric key parser 'x509' registered May 17 00:37:04.115337 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:37:04.115353 kernel: io scheduler mq-deadline registered May 17 00:37:04.115367 kernel: io scheduler kyber registered May 17 00:37:04.115381 kernel: io scheduler bfq registered May 17 00:37:04.115395 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:37:04.115449 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:37:04.115463 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:37:04.115477 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:37:04.115490 kernel: i8042: Warning: Keylock active May 17 00:37:04.115504 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:37:04.115520 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:37:04.115674 kernel: rtc_cmos 00:00: RTC can wake from S4 May 17 00:37:04.115787 kernel: rtc_cmos 00:00: registered as rtc0 May 17 00:37:04.115909 kernel: rtc_cmos 00:00: setting system clock to 2025-05-17T00:37:03 UTC (1747442223) May 17 00:37:04.116022 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 17 00:37:04.116039 kernel: intel_pstate: CPU model not supported May 17 00:37:04.116054 kernel: efifb: probing for efifb May 17 00:37:04.116068 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 17 00:37:04.116087 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 17 00:37:04.116101 kernel: efifb: scrolling: redraw May 17 00:37:04.116116 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:37:04.116130 kernel: Console: switching to colour frame buffer device 100x37 May 17 00:37:04.116145 kernel: fb0: EFI VGA frame buffer device May 17 00:37:04.116159 kernel: pstore: Registered efi as persistent store backend May 17 00:37:04.116196 kernel: NET: Registered PF_INET6 protocol family May 17 00:37:04.116214 kernel: Segment Routing with IPv6 May 17 00:37:04.116229 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:37:04.116247 kernel: NET: Registered PF_PACKET protocol family May 17 00:37:04.116262 kernel: Key type dns_resolver registered May 17 00:37:04.116277 kernel: IPI shorthand broadcast: enabled May 17 00:37:04.116292 kernel: sched_clock: Marking stable (435002112, 184065901)->(799944801, -180876788) May 17 00:37:04.116307 kernel: registered taskstats version 1 May 17 00:37:04.116322 kernel: Loading compiled-in X.509 certificates May 17 00:37:04.116337 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:37:04.116352 kernel: Key type .fscrypt registered May 17 00:37:04.116366 kernel: Key type fscrypt-provisioning registered May 17 00:37:04.116385 kernel: pstore: Using crash dump compression: deflate May 17 00:37:04.116400 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:37:04.116435 kernel: ima: Allocated hash algorithm: sha1 May 17 00:37:04.116447 kernel: ima: No architecture policies found May 17 00:37:04.116461 kernel: clk: Disabling unused clocks May 17 00:37:04.116474 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:37:04.116488 kernel: Write protecting the kernel read-only data: 28672k May 17 00:37:04.116503 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:37:04.116519 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:37:04.116537 kernel: Run /init as init process May 17 00:37:04.116554 kernel: with arguments: May 17 00:37:04.116569 kernel: /init May 17 00:37:04.116584 kernel: with environment: May 17 00:37:04.116599 kernel: HOME=/ May 17 00:37:04.116613 kernel: TERM=linux May 17 00:37:04.116629 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:37:04.116649 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:37:04.116671 systemd[1]: Detected virtualization amazon. May 17 00:37:04.116688 systemd[1]: Detected architecture x86-64. May 17 00:37:04.116704 systemd[1]: Running in initrd. May 17 00:37:04.116720 systemd[1]: No hostname configured, using default hostname. May 17 00:37:04.116736 systemd[1]: Hostname set to . May 17 00:37:04.116753 systemd[1]: Initializing machine ID from VM UUID. May 17 00:37:04.116770 systemd[1]: Queued start job for default target initrd.target. May 17 00:37:04.116790 systemd[1]: Started systemd-ask-password-console.path. May 17 00:37:04.116808 systemd[1]: Reached target cryptsetup.target. May 17 00:37:04.116824 systemd[1]: Reached target paths.target. May 17 00:37:04.116841 systemd[1]: Reached target slices.target. May 17 00:37:04.116857 systemd[1]: Reached target swap.target. May 17 00:37:04.116873 systemd[1]: Reached target timers.target. May 17 00:37:04.116893 systemd[1]: Listening on iscsid.socket. May 17 00:37:04.116909 systemd[1]: Listening on iscsiuio.socket. May 17 00:37:04.116926 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:37:04.116943 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:37:04.116959 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:37:04.116976 systemd[1]: Listening on systemd-journald.socket. May 17 00:37:04.116993 systemd[1]: Listening on systemd-networkd.socket. May 17 00:37:04.117012 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:37:04.117028 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:37:04.117045 systemd[1]: Reached target sockets.target. May 17 00:37:04.117062 systemd[1]: Starting kmod-static-nodes.service... May 17 00:37:04.117078 systemd[1]: Finished network-cleanup.service. May 17 00:37:04.117095 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:37:04.117111 systemd[1]: Starting systemd-journald.service... May 17 00:37:04.117128 systemd[1]: Starting systemd-modules-load.service... May 17 00:37:04.117145 systemd[1]: Starting systemd-resolved.service... May 17 00:37:04.117164 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:37:04.117180 systemd[1]: Finished kmod-static-nodes.service. May 17 00:37:04.117197 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:37:04.117213 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:37:04.117230 kernel: audit: type=1130 audit(1747442224.067:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.117247 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:37:04.117263 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:37:04.117280 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:37:04.117296 kernel: audit: type=1130 audit(1747442224.104:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.117322 systemd-journald[185]: Journal started May 17 00:37:04.117418 systemd-journald[185]: Runtime Journal (/run/log/journal/ec25f1a72925139823803a99ca06eaaa) is 4.8M, max 38.3M, 33.5M free. May 17 00:37:04.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.075450 systemd-modules-load[186]: Inserted module 'overlay' May 17 00:37:04.122776 systemd[1]: Started systemd-journald.service. May 17 00:37:04.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.132441 kernel: audit: type=1130 audit(1747442224.124:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.128293 systemd-resolved[187]: Positive Trust Anchors: May 17 00:37:04.128311 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:37:04.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.128358 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:37:04.170680 kernel: audit: type=1130 audit(1747442224.138:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.170719 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:37:04.170740 kernel: audit: type=1130 audit(1747442224.160:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.134689 systemd-resolved[187]: Defaulting to hostname 'linux'. May 17 00:37:04.136045 systemd[1]: Started systemd-resolved.service. May 17 00:37:04.138673 systemd[1]: Reached target nss-lookup.target. May 17 00:37:04.158588 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:37:04.172595 systemd[1]: Starting dracut-cmdline.service... May 17 00:37:04.186100 kernel: Bridge firewalling registered May 17 00:37:04.183631 systemd-modules-load[186]: Inserted module 'br_netfilter' May 17 00:37:04.189394 dracut-cmdline[202]: dracut-dracut-053 May 17 00:37:04.193906 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:37:04.217430 kernel: SCSI subsystem initialized May 17 00:37:04.237536 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:37:04.237614 kernel: device-mapper: uevent: version 1.0.3 May 17 00:37:04.240149 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:37:04.244697 systemd-modules-load[186]: Inserted module 'dm_multipath' May 17 00:37:04.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.246929 systemd[1]: Finished systemd-modules-load.service. May 17 00:37:04.256874 kernel: audit: type=1130 audit(1747442224.247:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.257071 systemd[1]: Starting systemd-sysctl.service... May 17 00:37:04.269245 systemd[1]: Finished systemd-sysctl.service. May 17 00:37:04.277802 kernel: audit: type=1130 audit(1747442224.270:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.282435 kernel: Loading iSCSI transport class v2.0-870. May 17 00:37:04.307484 kernel: iscsi: registered transport (tcp) May 17 00:37:04.333082 kernel: iscsi: registered transport (qla4xxx) May 17 00:37:04.333161 kernel: QLogic iSCSI HBA Driver May 17 00:37:04.366107 systemd[1]: Finished dracut-cmdline.service. May 17 00:37:04.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.368176 systemd[1]: Starting dracut-pre-udev.service... May 17 00:37:04.375444 kernel: audit: type=1130 audit(1747442224.366:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.423462 kernel: raid6: avx512x4 gen() 17471 MB/s May 17 00:37:04.442439 kernel: raid6: avx512x4 xor() 7593 MB/s May 17 00:37:04.460454 kernel: raid6: avx512x2 gen() 16719 MB/s May 17 00:37:04.478437 kernel: raid6: avx512x2 xor() 24067 MB/s May 17 00:37:04.496492 kernel: raid6: avx512x1 gen() 17545 MB/s May 17 00:37:04.514439 kernel: raid6: avx512x1 xor() 21095 MB/s May 17 00:37:04.532457 kernel: raid6: avx2x4 gen() 17953 MB/s May 17 00:37:04.550438 kernel: raid6: avx2x4 xor() 6936 MB/s May 17 00:37:04.568461 kernel: raid6: avx2x2 gen() 17648 MB/s May 17 00:37:04.586435 kernel: raid6: avx2x2 xor() 18117 MB/s May 17 00:37:04.604447 kernel: raid6: avx2x1 gen() 13693 MB/s May 17 00:37:04.622440 kernel: raid6: avx2x1 xor() 15298 MB/s May 17 00:37:04.640455 kernel: raid6: sse2x4 gen() 9530 MB/s May 17 00:37:04.658436 kernel: raid6: sse2x4 xor() 5927 MB/s May 17 00:37:04.676450 kernel: raid6: sse2x2 gen() 10155 MB/s May 17 00:37:04.694436 kernel: raid6: sse2x2 xor() 6284 MB/s May 17 00:37:04.712442 kernel: raid6: sse2x1 gen() 9424 MB/s May 17 00:37:04.730620 kernel: raid6: sse2x1 xor() 4743 MB/s May 17 00:37:04.730693 kernel: raid6: using algorithm avx2x4 gen() 17953 MB/s May 17 00:37:04.730726 kernel: raid6: .... xor() 6936 MB/s, rmw enabled May 17 00:37:04.731736 kernel: raid6: using avx512x2 recovery algorithm May 17 00:37:04.746435 kernel: xor: automatically using best checksumming function avx May 17 00:37:04.850438 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:37:04.859493 systemd[1]: Finished dracut-pre-udev.service. May 17 00:37:04.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.861035 systemd[1]: Starting systemd-udevd.service... May 17 00:37:04.866546 kernel: audit: type=1130 audit(1747442224.859:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.860000 audit: BPF prog-id=7 op=LOAD May 17 00:37:04.860000 audit: BPF prog-id=8 op=LOAD May 17 00:37:04.879114 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 17 00:37:04.884625 systemd[1]: Started systemd-udevd.service. May 17 00:37:04.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.887307 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:37:04.906437 dracut-pre-trigger[391]: rd.md=0: removing MD RAID activation May 17 00:37:04.938650 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:37:04.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.940334 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:37:04.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:04.984319 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:37:05.050425 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:37:05.050485 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 17 00:37:05.078077 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 17 00:37:05.078264 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 17 00:37:05.078436 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:25:4e:f0:21:45 May 17 00:37:05.080301 (udev-worker)[442]: Network interface NamePolicy= disabled on kernel command line. May 17 00:37:05.094444 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:37:05.098426 kernel: AES CTR mode by8 optimization enabled May 17 00:37:05.102633 kernel: nvme nvme0: pci function 0000:00:04.0 May 17 00:37:05.102885 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 17 00:37:05.114441 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 17 00:37:05.121991 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:37:05.122062 kernel: GPT:9289727 != 16777215 May 17 00:37:05.122082 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:37:05.123726 kernel: GPT:9289727 != 16777215 May 17 00:37:05.127524 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:37:05.127589 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:37:05.209431 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (433) May 17 00:37:05.226462 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:37:05.290928 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:37:05.296720 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:37:05.301626 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:37:05.302376 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:37:05.304776 systemd[1]: Starting disk-uuid.service... May 17 00:37:05.312231 disk-uuid[593]: Primary Header is updated. May 17 00:37:05.312231 disk-uuid[593]: Secondary Entries is updated. May 17 00:37:05.312231 disk-uuid[593]: Secondary Header is updated. May 17 00:37:05.320436 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:37:05.330433 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:37:05.339432 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:37:06.342427 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 17 00:37:06.342658 disk-uuid[594]: The operation has completed successfully. May 17 00:37:06.491090 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:37:06.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.491207 systemd[1]: Finished disk-uuid.service. May 17 00:37:06.498155 systemd[1]: Starting verity-setup.service... May 17 00:37:06.529431 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 17 00:37:06.648085 systemd[1]: Found device dev-mapper-usr.device. May 17 00:37:06.650258 systemd[1]: Mounting sysusr-usr.mount... May 17 00:37:06.653557 systemd[1]: Finished verity-setup.service. May 17 00:37:06.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.749751 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:37:06.750317 systemd[1]: Mounted sysusr-usr.mount. May 17 00:37:06.751336 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:37:06.752677 systemd[1]: Starting ignition-setup.service... May 17 00:37:06.757841 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:37:06.781815 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:37:06.781887 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:37:06.781908 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:37:06.805433 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:37:06.820607 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:37:06.835739 systemd[1]: Finished ignition-setup.service. May 17 00:37:06.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.837956 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:37:06.851639 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:37:06.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.853000 audit: BPF prog-id=9 op=LOAD May 17 00:37:06.854293 systemd[1]: Starting systemd-networkd.service... May 17 00:37:06.877975 systemd-networkd[1106]: lo: Link UP May 17 00:37:06.877988 systemd-networkd[1106]: lo: Gained carrier May 17 00:37:06.879011 systemd-networkd[1106]: Enumeration completed May 17 00:37:06.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.879142 systemd[1]: Started systemd-networkd.service. May 17 00:37:06.879584 systemd-networkd[1106]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:37:06.880651 systemd[1]: Reached target network.target. May 17 00:37:06.882677 systemd[1]: Starting iscsiuio.service... May 17 00:37:06.885892 systemd-networkd[1106]: eth0: Link UP May 17 00:37:06.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.885902 systemd-networkd[1106]: eth0: Gained carrier May 17 00:37:06.891345 systemd[1]: Started iscsiuio.service. May 17 00:37:06.893589 systemd[1]: Starting iscsid.service... May 17 00:37:06.899241 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:37:06.899241 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:37:06.899241 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:37:06.899241 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:37:06.907329 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:37:06.907329 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:37:06.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.901340 systemd[1]: Started iscsid.service. May 17 00:37:06.902547 systemd-networkd[1106]: eth0: DHCPv4 address 172.31.19.224/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:37:06.907972 systemd[1]: Starting dracut-initqueue.service... May 17 00:37:06.924529 systemd[1]: Finished dracut-initqueue.service. May 17 00:37:06.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:06.925619 systemd[1]: Reached target remote-fs-pre.target. May 17 00:37:06.926834 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:37:06.928660 systemd[1]: Reached target remote-fs.target. May 17 00:37:06.932012 systemd[1]: Starting dracut-pre-mount.service... May 17 00:37:06.943101 systemd[1]: Finished dracut-pre-mount.service. May 17 00:37:06.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.429875 ignition[1096]: Ignition 2.14.0 May 17 00:37:07.429888 ignition[1096]: Stage: fetch-offline May 17 00:37:07.430007 ignition[1096]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:07.430038 ignition[1096]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:07.450919 ignition[1096]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:07.451630 ignition[1096]: Ignition finished successfully May 17 00:37:07.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.453479 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:37:07.455226 systemd[1]: Starting ignition-fetch.service... May 17 00:37:07.464721 ignition[1130]: Ignition 2.14.0 May 17 00:37:07.464737 ignition[1130]: Stage: fetch May 17 00:37:07.464950 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:07.464983 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:07.472712 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:07.473804 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:07.527464 ignition[1130]: INFO : PUT result: OK May 17 00:37:07.533015 ignition[1130]: DEBUG : parsed url from cmdline: "" May 17 00:37:07.533015 ignition[1130]: INFO : no config URL provided May 17 00:37:07.533015 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 17 00:37:07.533015 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" May 17 00:37:07.536085 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:07.536085 ignition[1130]: INFO : PUT result: OK May 17 00:37:07.536085 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 17 00:37:07.536085 ignition[1130]: INFO : GET result: OK May 17 00:37:07.536085 ignition[1130]: DEBUG : parsing config with SHA512: 41a7ea481ac1965dcee2b37d278a044d38ce5337f4f95e8ccf0aad9b343ef0e6be9681a501d3c9c4bde98fa7924efc1331fe706640f6fe1db14e460081863249 May 17 00:37:07.542808 unknown[1130]: fetched base config from "system" May 17 00:37:07.543446 ignition[1130]: fetch: fetch complete May 17 00:37:07.542823 unknown[1130]: fetched base config from "system" May 17 00:37:07.543454 ignition[1130]: fetch: fetch passed May 17 00:37:07.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.542834 unknown[1130]: fetched user config from "aws" May 17 00:37:07.543528 ignition[1130]: Ignition finished successfully May 17 00:37:07.545571 systemd[1]: Finished ignition-fetch.service. May 17 00:37:07.547379 systemd[1]: Starting ignition-kargs.service... May 17 00:37:07.559302 ignition[1136]: Ignition 2.14.0 May 17 00:37:07.559318 ignition[1136]: Stage: kargs May 17 00:37:07.559553 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:07.559588 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:07.567493 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:07.568502 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:07.569233 ignition[1136]: INFO : PUT result: OK May 17 00:37:07.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.572785 systemd[1]: Finished ignition-kargs.service. May 17 00:37:07.571638 ignition[1136]: kargs: kargs passed May 17 00:37:07.571697 ignition[1136]: Ignition finished successfully May 17 00:37:07.574492 systemd[1]: Starting ignition-disks.service... May 17 00:37:07.584148 ignition[1142]: Ignition 2.14.0 May 17 00:37:07.584161 ignition[1142]: Stage: disks May 17 00:37:07.584388 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:07.584456 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:07.591721 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:07.592849 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:07.593614 ignition[1142]: INFO : PUT result: OK May 17 00:37:07.595530 ignition[1142]: disks: disks passed May 17 00:37:07.595596 ignition[1142]: Ignition finished successfully May 17 00:37:07.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.597002 systemd[1]: Finished ignition-disks.service. May 17 00:37:07.597706 systemd[1]: Reached target initrd-root-device.target. May 17 00:37:07.598684 systemd[1]: Reached target local-fs-pre.target. May 17 00:37:07.599657 systemd[1]: Reached target local-fs.target. May 17 00:37:07.600728 systemd[1]: Reached target sysinit.target. May 17 00:37:07.601687 systemd[1]: Reached target basic.target. May 17 00:37:07.603927 systemd[1]: Starting systemd-fsck-root.service... May 17 00:37:07.633494 systemd-fsck[1150]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:37:07.636544 systemd[1]: Finished systemd-fsck-root.service. May 17 00:37:07.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.638006 systemd[1]: Mounting sysroot.mount... May 17 00:37:07.663437 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:37:07.663718 systemd[1]: Mounted sysroot.mount. May 17 00:37:07.665263 systemd[1]: Reached target initrd-root-fs.target. May 17 00:37:07.668648 systemd[1]: Mounting sysroot-usr.mount... May 17 00:37:07.670345 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:37:07.671483 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:37:07.672672 systemd[1]: Reached target ignition-diskful.target. May 17 00:37:07.674327 systemd[1]: Mounted sysroot-usr.mount. May 17 00:37:07.677738 systemd[1]: Starting initrd-setup-root.service... May 17 00:37:07.692447 initrd-setup-root[1171]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:37:07.700552 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:37:07.711156 initrd-setup-root[1180]: cut: /sysroot/etc/group: No such file or directory May 17 00:37:07.715793 initrd-setup-root[1188]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:37:07.720517 initrd-setup-root[1196]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:37:07.726432 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1178) May 17 00:37:07.730492 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:37:07.730544 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:37:07.730557 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:37:07.756446 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:37:07.767397 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:37:07.916708 systemd[1]: Finished initrd-setup-root.service. May 17 00:37:07.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.918303 systemd[1]: Starting ignition-mount.service... May 17 00:37:07.920637 systemd[1]: Starting sysroot-boot.service... May 17 00:37:07.927186 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 17 00:37:07.927287 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 17 00:37:07.944386 ignition[1232]: INFO : Ignition 2.14.0 May 17 00:37:07.944386 ignition[1232]: INFO : Stage: mount May 17 00:37:07.946706 ignition[1232]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:07.946706 ignition[1232]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:07.955651 ignition[1232]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:07.957149 ignition[1232]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:07.959059 ignition[1232]: INFO : PUT result: OK May 17 00:37:07.966044 ignition[1232]: INFO : mount: mount passed May 17 00:37:07.966810 ignition[1232]: INFO : Ignition finished successfully May 17 00:37:07.968746 systemd[1]: Finished ignition-mount.service. May 17 00:37:07.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.970135 systemd[1]: Starting ignition-files.service... May 17 00:37:07.976657 systemd[1]: Finished sysroot-boot.service. May 17 00:37:07.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:07.981200 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:37:08.009465 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1242) May 17 00:37:08.013437 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 17 00:37:08.013513 kernel: BTRFS info (device nvme0n1p6): using free space tree May 17 00:37:08.013526 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 17 00:37:08.059459 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 17 00:37:08.064305 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:37:08.075342 ignition[1261]: INFO : Ignition 2.14.0 May 17 00:37:08.075342 ignition[1261]: INFO : Stage: files May 17 00:37:08.077589 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:08.077589 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:08.084525 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:08.085443 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:08.086296 ignition[1261]: INFO : PUT result: OK May 17 00:37:08.090041 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping May 17 00:37:08.099113 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:37:08.099113 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:37:08.126927 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:37:08.128491 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:37:08.129983 unknown[1261]: wrote ssh authorized keys file for user: core May 17 00:37:08.131042 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:37:08.133089 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" May 17 00:37:08.133089 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" May 17 00:37:08.133089 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:37:08.133089 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:37:08.145062 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2457639141" May 17 00:37:08.146747 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2457639141": device or resource busy May 17 00:37:08.146747 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2457639141", trying btrfs: device or resource busy May 17 00:37:08.146747 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2457639141" May 17 00:37:08.146747 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2457639141" May 17 00:37:08.160114 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem2457639141" May 17 00:37:08.161229 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem2457639141" May 17 00:37:08.161229 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 17 00:37:08.161229 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" May 17 00:37:08.161229 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:37:08.170173 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:37:08.170173 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:37:08.170173 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:37:08.170173 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:37:08.170173 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:37:08.170173 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:37:08.187806 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3663481078" May 17 00:37:08.187806 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3663481078": device or resource busy May 17 00:37:08.187806 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3663481078", trying btrfs: device or resource busy May 17 00:37:08.187806 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3663481078" May 17 00:37:08.187806 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3663481078" May 17 00:37:08.187806 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem3663481078" May 17 00:37:08.187806 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem3663481078" May 17 00:37:08.187806 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 17 00:37:08.187806 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:37:08.187806 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:37:08.208791 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1238428823" May 17 00:37:08.208791 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1238428823": device or resource busy May 17 00:37:08.208791 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1238428823", trying btrfs: device or resource busy May 17 00:37:08.208791 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1238428823" May 17 00:37:08.208791 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1238428823" May 17 00:37:08.208791 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem1238428823" May 17 00:37:08.208791 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem1238428823" May 17 00:37:08.208791 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 17 00:37:08.208791 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:37:08.208791 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 17 00:37:08.208791 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem928590904" May 17 00:37:08.208791 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem928590904": device or resource busy May 17 00:37:08.208791 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem928590904", trying btrfs: device or resource busy May 17 00:37:08.208791 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem928590904" May 17 00:37:08.208791 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem928590904" May 17 00:37:08.208791 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem928590904" May 17 00:37:08.208791 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem928590904" May 17 00:37:08.208791 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 17 00:37:08.208791 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:37:08.208791 ignition[1261]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:37:08.760589 systemd-networkd[1106]: eth0: Gained IPv6LL May 17 00:37:09.011027 ignition[1261]: INFO : GET result: OK May 17 00:37:09.406690 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:37:09.406690 ignition[1261]: INFO : files: op(c): [started] processing unit "amazon-ssm-agent.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(c): op(d): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(c): op(d): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(c): [finished] processing unit "amazon-ssm-agent.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(e): [started] processing unit "nvidia.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(e): [finished] processing unit "nvidia.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(10): [started] processing unit "containerd.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(10): op(11): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(10): op(11): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(10): [finished] processing unit "containerd.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(12): [started] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(12): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(13): [started] setting preset to enabled for "nvidia.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(13): [finished] setting preset to enabled for "nvidia.service" May 17 00:37:09.412077 ignition[1261]: INFO : files: op(14): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:37:09.412077 ignition[1261]: INFO : files: op(14): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 17 00:37:09.483030 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 00:37:09.483067 kernel: audit: type=1130 audit(1747442229.420:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.483089 kernel: audit: type=1130 audit(1747442229.442:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.483116 kernel: audit: type=1131 audit(1747442229.442:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.483135 kernel: audit: type=1130 audit(1747442229.453:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.483363 ignition[1261]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:37:09.483363 ignition[1261]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:37:09.483363 ignition[1261]: INFO : files: files passed May 17 00:37:09.483363 ignition[1261]: INFO : Ignition finished successfully May 17 00:37:09.506866 kernel: audit: type=1130 audit(1747442229.488:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.506906 kernel: audit: type=1131 audit(1747442229.488:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.418646 systemd[1]: Finished ignition-files.service. May 17 00:37:09.428636 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:37:09.512116 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:37:09.430970 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:37:09.433277 systemd[1]: Starting ignition-quench.service... May 17 00:37:09.438747 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:37:09.438880 systemd[1]: Finished ignition-quench.service. May 17 00:37:09.448214 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:37:09.454139 systemd[1]: Reached target ignition-complete.target. May 17 00:37:09.463665 systemd[1]: Starting initrd-parse-etc.service... May 17 00:37:09.486739 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:37:09.486866 systemd[1]: Finished initrd-parse-etc.service. May 17 00:37:09.489266 systemd[1]: Reached target initrd-fs.target. May 17 00:37:09.536450 kernel: audit: type=1130 audit(1747442229.527:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.504803 systemd[1]: Reached target initrd.target. May 17 00:37:09.508181 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:37:09.509572 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:37:09.526870 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:37:09.529637 systemd[1]: Starting initrd-cleanup.service... May 17 00:37:09.545796 systemd[1]: Stopped target nss-lookup.target. May 17 00:37:09.546866 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:37:09.548326 systemd[1]: Stopped target timers.target. May 17 00:37:09.549547 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:37:09.555957 kernel: audit: type=1131 audit(1747442229.550:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.549759 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:37:09.550991 systemd[1]: Stopped target initrd.target. May 17 00:37:09.556900 systemd[1]: Stopped target basic.target. May 17 00:37:09.558135 systemd[1]: Stopped target ignition-complete.target. May 17 00:37:09.559298 systemd[1]: Stopped target ignition-diskful.target. May 17 00:37:09.560552 systemd[1]: Stopped target initrd-root-device.target. May 17 00:37:09.561741 systemd[1]: Stopped target remote-fs.target. May 17 00:37:09.562887 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:37:09.564188 systemd[1]: Stopped target sysinit.target. May 17 00:37:09.565350 systemd[1]: Stopped target local-fs.target. May 17 00:37:09.566530 systemd[1]: Stopped target local-fs-pre.target. May 17 00:37:09.567661 systemd[1]: Stopped target swap.target. May 17 00:37:09.575051 kernel: audit: type=1131 audit(1747442229.569:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.568835 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:37:09.569042 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:37:09.582366 kernel: audit: type=1131 audit(1747442229.576:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.570218 systemd[1]: Stopped target cryptsetup.target. May 17 00:37:09.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.575893 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:37:09.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.576122 systemd[1]: Stopped dracut-initqueue.service. May 17 00:37:09.577361 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:37:09.577602 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:37:09.583386 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:37:09.583623 systemd[1]: Stopped ignition-files.service. May 17 00:37:09.586142 systemd[1]: Stopping ignition-mount.service... May 17 00:37:09.587644 systemd[1]: Stopping iscsiuio.service... May 17 00:37:09.597447 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:37:09.597676 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:37:09.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.602030 ignition[1299]: INFO : Ignition 2.14.0 May 17 00:37:09.602030 ignition[1299]: INFO : Stage: umount May 17 00:37:09.602030 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 17 00:37:09.602030 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 17 00:37:09.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.603668 systemd[1]: Stopping sysroot-boot.service... May 17 00:37:09.604939 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:37:09.606244 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:37:09.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.609691 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:37:09.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.609937 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:37:09.617575 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:37:09.618938 systemd[1]: Stopped iscsiuio.service. May 17 00:37:09.622886 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:37:09.624256 systemd[1]: Finished initrd-cleanup.service. May 17 00:37:09.634587 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 17 00:37:09.634587 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 17 00:37:09.636795 ignition[1299]: INFO : PUT result: OK May 17 00:37:09.634966 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:37:09.642115 ignition[1299]: INFO : umount: umount passed May 17 00:37:09.643154 ignition[1299]: INFO : Ignition finished successfully May 17 00:37:09.643522 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:37:09.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.643651 systemd[1]: Stopped ignition-mount.service. May 17 00:37:09.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.645126 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:37:09.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.645198 systemd[1]: Stopped ignition-disks.service. May 17 00:37:09.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.646301 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:37:09.646365 systemd[1]: Stopped ignition-kargs.service. May 17 00:37:09.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.647522 systemd[1]: ignition-fetch.service: Deactivated successfully. May 17 00:37:09.647583 systemd[1]: Stopped ignition-fetch.service. May 17 00:37:09.648936 systemd[1]: Stopped target network.target. May 17 00:37:09.650052 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:37:09.650124 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:37:09.651257 systemd[1]: Stopped target paths.target. May 17 00:37:09.652783 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:37:09.656499 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:37:09.658423 systemd[1]: Stopped target slices.target. May 17 00:37:09.660051 systemd[1]: Stopped target sockets.target. May 17 00:37:09.661137 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:37:09.661182 systemd[1]: Closed iscsid.socket. May 17 00:37:09.662205 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:37:09.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.662259 systemd[1]: Closed iscsiuio.socket. May 17 00:37:09.663315 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:37:09.663381 systemd[1]: Stopped ignition-setup.service. May 17 00:37:09.664871 systemd[1]: Stopping systemd-networkd.service... May 17 00:37:09.665930 systemd[1]: Stopping systemd-resolved.service... May 17 00:37:09.668463 systemd-networkd[1106]: eth0: DHCPv6 lease lost May 17 00:37:09.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.669723 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:37:09.669856 systemd[1]: Stopped systemd-networkd.service. May 17 00:37:09.670889 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:37:09.673000 audit: BPF prog-id=9 op=UNLOAD May 17 00:37:09.670935 systemd[1]: Closed systemd-networkd.socket. May 17 00:37:09.674682 systemd[1]: Stopping network-cleanup.service... May 17 00:37:09.677177 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:37:09.677530 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:37:09.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.678538 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:37:09.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.678601 systemd[1]: Stopped systemd-sysctl.service. May 17 00:37:09.679768 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:37:09.679929 systemd[1]: Stopped systemd-modules-load.service. May 17 00:37:09.681751 systemd[1]: Stopping systemd-udevd.service... May 17 00:37:09.688845 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:37:09.691745 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:37:09.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.691885 systemd[1]: Stopped systemd-resolved.service. May 17 00:37:09.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.693282 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:37:09.693468 systemd[1]: Stopped systemd-udevd.service. May 17 00:37:09.696000 audit: BPF prog-id=6 op=UNLOAD May 17 00:37:09.695660 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:37:09.695718 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:37:09.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.698555 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:37:09.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.698606 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:37:09.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.699242 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:37:09.699309 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:37:09.700560 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:37:09.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.700620 systemd[1]: Stopped dracut-cmdline.service. May 17 00:37:09.701516 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:37:09.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.701572 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:37:09.703938 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:37:09.707978 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:37:09.708094 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:37:09.711987 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:37:09.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.712147 systemd[1]: Stopped network-cleanup.service. May 17 00:37:09.716317 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:37:09.717141 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:37:09.773496 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:37:09.773598 systemd[1]: Stopped sysroot-boot.service. May 17 00:37:09.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.774893 systemd[1]: Reached target initrd-switch-root.target. May 17 00:37:09.775947 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:37:09.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:09.776013 systemd[1]: Stopped initrd-setup-root.service. May 17 00:37:09.778062 systemd[1]: Starting initrd-switch-root.service... May 17 00:37:09.796634 systemd[1]: Switching root. May 17 00:37:09.798000 audit: BPF prog-id=8 op=UNLOAD May 17 00:37:09.798000 audit: BPF prog-id=7 op=UNLOAD May 17 00:37:09.799000 audit: BPF prog-id=5 op=UNLOAD May 17 00:37:09.799000 audit: BPF prog-id=4 op=UNLOAD May 17 00:37:09.799000 audit: BPF prog-id=3 op=UNLOAD May 17 00:37:09.812106 iscsid[1111]: iscsid shutting down. May 17 00:37:09.813325 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). May 17 00:37:09.813464 systemd-journald[185]: Journal stopped May 17 00:37:15.169266 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:37:15.169349 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:37:15.169371 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:37:15.169400 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:37:15.169437 kernel: SELinux: policy capability open_perms=1 May 17 00:37:15.169456 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:37:15.169483 kernel: SELinux: policy capability always_check_network=0 May 17 00:37:15.169502 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:37:15.169525 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:37:15.169544 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:37:15.169563 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:37:15.169586 systemd[1]: Successfully loaded SELinux policy in 93.149ms. May 17 00:37:15.169613 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.048ms. May 17 00:37:15.169636 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:37:15.169661 systemd[1]: Detected virtualization amazon. May 17 00:37:15.169682 systemd[1]: Detected architecture x86-64. May 17 00:37:15.169702 systemd[1]: Detected first boot. May 17 00:37:15.169723 systemd[1]: Initializing machine ID from VM UUID. May 17 00:37:15.169744 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:37:15.169765 systemd[1]: Populated /etc with preset unit settings. May 17 00:37:15.169786 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:37:15.169812 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:37:15.169838 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:37:15.169859 systemd[1]: Queued start job for default target multi-user.target. May 17 00:37:15.169880 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 17 00:37:15.169901 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:37:15.169921 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:37:15.169942 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 17 00:37:15.169962 systemd[1]: Created slice system-getty.slice. May 17 00:37:15.169983 systemd[1]: Created slice system-modprobe.slice. May 17 00:37:15.170006 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:37:15.170027 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:37:15.170052 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:37:15.170072 systemd[1]: Created slice user.slice. May 17 00:37:15.170094 systemd[1]: Started systemd-ask-password-console.path. May 17 00:37:15.170115 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:37:15.170135 systemd[1]: Set up automount boot.automount. May 17 00:37:15.170155 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:37:15.170175 systemd[1]: Reached target integritysetup.target. May 17 00:37:15.170197 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:37:15.170215 systemd[1]: Reached target remote-fs.target. May 17 00:37:15.170234 systemd[1]: Reached target slices.target. May 17 00:37:15.170252 systemd[1]: Reached target swap.target. May 17 00:37:15.170270 systemd[1]: Reached target torcx.target. May 17 00:37:15.170287 systemd[1]: Reached target veritysetup.target. May 17 00:37:15.170305 systemd[1]: Listening on systemd-coredump.socket. May 17 00:37:15.170323 systemd[1]: Listening on systemd-initctl.socket. May 17 00:37:15.170343 kernel: kauditd_printk_skb: 47 callbacks suppressed May 17 00:37:15.170361 kernel: audit: type=1400 audit(1747442234.952:85): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:37:15.170379 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:37:15.170397 kernel: audit: type=1335 audit(1747442234.952:86): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 17 00:37:15.170426 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:37:15.170444 systemd[1]: Listening on systemd-journald.socket. May 17 00:37:15.170462 systemd[1]: Listening on systemd-networkd.socket. May 17 00:37:15.170480 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:37:15.170500 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:37:15.170522 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:37:15.170540 systemd[1]: Mounting dev-hugepages.mount... May 17 00:37:15.170558 systemd[1]: Mounting dev-mqueue.mount... May 17 00:37:15.170576 systemd[1]: Mounting media.mount... May 17 00:37:15.170596 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:37:15.170615 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:37:15.170633 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:37:15.170651 systemd[1]: Mounting tmp.mount... May 17 00:37:15.170671 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:37:15.170690 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:37:15.170717 systemd[1]: Starting kmod-static-nodes.service... May 17 00:37:15.170738 systemd[1]: Starting modprobe@configfs.service... May 17 00:37:15.170759 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:37:15.170776 systemd[1]: Starting modprobe@drm.service... May 17 00:37:15.170796 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:37:15.170813 systemd[1]: Starting modprobe@fuse.service... May 17 00:37:15.170831 systemd[1]: Starting modprobe@loop.service... May 17 00:37:15.170851 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:37:15.170870 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. May 17 00:37:15.170888 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) May 17 00:37:15.170905 systemd[1]: Starting systemd-journald.service... May 17 00:37:15.170926 systemd[1]: Starting systemd-modules-load.service... May 17 00:37:15.170944 systemd[1]: Starting systemd-network-generator.service... May 17 00:37:15.170962 systemd[1]: Starting systemd-remount-fs.service... May 17 00:37:15.170979 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:37:15.170999 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:37:15.171017 systemd[1]: Mounted dev-hugepages.mount. May 17 00:37:15.171035 systemd[1]: Mounted dev-mqueue.mount. May 17 00:37:15.171053 systemd[1]: Mounted media.mount. May 17 00:37:15.171071 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:37:15.171091 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:37:15.171109 systemd[1]: Mounted tmp.mount. May 17 00:37:15.171127 systemd[1]: Finished kmod-static-nodes.service. May 17 00:37:15.171145 kernel: audit: type=1305 audit(1747442235.166:87): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:37:15.171164 kernel: audit: type=1300 audit(1747442235.166:87): arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc36e88ca0 a2=4000 a3=7ffc36e88d3c items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:15.171181 kernel: audit: type=1327 audit(1747442235.166:87): proctitle="/usr/lib/systemd/systemd-journald" May 17 00:37:15.171204 systemd-journald[1452]: Journal started May 17 00:37:15.171281 systemd-journald[1452]: Runtime Journal (/run/log/journal/ec25f1a72925139823803a99ca06eaaa) is 4.8M, max 38.3M, 33.5M free. May 17 00:37:14.952000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:37:14.952000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 17 00:37:15.166000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:37:15.166000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc36e88ca0 a2=4000 a3=7ffc36e88d3c items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:15.166000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:37:15.197605 kernel: audit: type=1130 audit(1747442235.186:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.197672 systemd[1]: Started systemd-journald.service. May 17 00:37:15.197713 kernel: audit: type=1130 audit(1747442235.195:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.197284 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:37:15.197538 systemd[1]: Finished modprobe@configfs.service. May 17 00:37:15.205711 kernel: loop: module loaded May 17 00:37:15.205782 kernel: audit: type=1130 audit(1747442235.204:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.205324 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:37:15.205688 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:37:15.218247 kernel: audit: type=1131 audit(1747442235.204:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.212325 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:37:15.212585 systemd[1]: Finished modprobe@drm.service. May 17 00:37:15.219905 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:37:15.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.227424 kernel: audit: type=1130 audit(1747442235.211:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.236297 kernel: fuse: init (API version 7.34) May 17 00:37:15.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.229813 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:37:15.231428 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:37:15.231668 systemd[1]: Finished modprobe@loop.service. May 17 00:37:15.233331 systemd[1]: Finished systemd-modules-load.service. May 17 00:37:15.234985 systemd[1]: Finished systemd-network-generator.service. May 17 00:37:15.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.238053 systemd[1]: Finished systemd-remount-fs.service. May 17 00:37:15.241847 systemd[1]: Reached target network-pre.target. May 17 00:37:15.244787 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:37:15.246666 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:37:15.255028 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:37:15.258202 systemd[1]: Starting systemd-journal-flush.service... May 17 00:37:15.263472 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:37:15.266231 systemd[1]: Starting systemd-random-seed.service... May 17 00:37:15.271370 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:37:15.273672 systemd[1]: Starting systemd-sysctl.service... May 17 00:37:15.278390 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:37:15.278904 systemd[1]: Finished modprobe@fuse.service. May 17 00:37:15.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.282599 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:37:15.284899 systemd[1]: Finished systemd-random-seed.service. May 17 00:37:15.291715 systemd[1]: Reached target first-boot-complete.target. May 17 00:37:15.300284 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:37:15.304372 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:37:15.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.313631 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:37:15.316505 systemd[1]: Starting systemd-sysusers.service... May 17 00:37:15.317941 systemd-journald[1452]: Time spent on flushing to /var/log/journal/ec25f1a72925139823803a99ca06eaaa is 61.266ms for 1145 entries. May 17 00:37:15.317941 systemd-journald[1452]: System Journal (/var/log/journal/ec25f1a72925139823803a99ca06eaaa) is 8.0M, max 195.6M, 187.6M free. May 17 00:37:15.401816 systemd-journald[1452]: Received client request to flush runtime journal. May 17 00:37:15.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.327159 systemd[1]: Finished systemd-sysctl.service. May 17 00:37:15.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.403366 systemd[1]: Finished systemd-journal-flush.service. May 17 00:37:15.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.420481 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:37:15.423068 systemd[1]: Starting systemd-udev-settle.service... May 17 00:37:15.437144 udevadm[1501]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:37:15.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.499555 systemd[1]: Finished systemd-sysusers.service. May 17 00:37:15.502204 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:37:15.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:15.613228 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:37:16.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.018267 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:37:16.019997 systemd[1]: Starting systemd-udevd.service... May 17 00:37:16.041696 systemd-udevd[1508]: Using default interface naming scheme 'v252'. May 17 00:37:16.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.117107 systemd[1]: Started systemd-udevd.service. May 17 00:37:16.119282 systemd[1]: Starting systemd-networkd.service... May 17 00:37:16.145023 systemd[1]: Starting systemd-userdbd.service... May 17 00:37:16.195171 systemd[1]: Found device dev-ttyS0.device. May 17 00:37:16.224061 (udev-worker)[1518]: Network interface NamePolicy= disabled on kernel command line. May 17 00:37:16.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.230688 systemd[1]: Started systemd-userdbd.service. May 17 00:37:16.272479 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:37:16.273000 audit[1523]: AVC avc: denied { confidentiality } for pid=1523 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:37:16.292808 kernel: ACPI: button: Power Button [PWRF] May 17 00:37:16.292923 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 17 00:37:16.273000 audit[1523]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5632fa0e71b0 a1=338ac a2=7f93a92e7bc5 a3=5 items=110 ppid=1508 pid=1523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:16.273000 audit: CWD cwd="/" May 17 00:37:16.273000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=1 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=2 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=3 name=(null) inode=14933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=4 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=5 name=(null) inode=14934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=6 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=7 name=(null) inode=14935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.305453 kernel: ACPI: button: Sleep Button [SLPF] May 17 00:37:16.273000 audit: PATH item=8 name=(null) inode=14935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=9 name=(null) inode=14936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=10 name=(null) inode=14935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=11 name=(null) inode=14937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=12 name=(null) inode=14935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=13 name=(null) inode=14938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=14 name=(null) inode=14935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=15 name=(null) inode=14939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=16 name=(null) inode=14935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=17 name=(null) inode=14940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=18 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=19 name=(null) inode=14941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=20 name=(null) inode=14941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=21 name=(null) inode=14942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=22 name=(null) inode=14941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=23 name=(null) inode=14943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=24 name=(null) inode=14941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=25 name=(null) inode=14944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=26 name=(null) inode=14941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=27 name=(null) inode=14945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=28 name=(null) inode=14941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=29 name=(null) inode=14946 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=30 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=31 name=(null) inode=14947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=32 name=(null) inode=14947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=33 name=(null) inode=14948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=34 name=(null) inode=14947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=35 name=(null) inode=14949 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=36 name=(null) inode=14947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=37 name=(null) inode=14950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=38 name=(null) inode=14947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=39 name=(null) inode=14951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=40 name=(null) inode=14947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=41 name=(null) inode=14952 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=42 name=(null) inode=14932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=43 name=(null) inode=14953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=44 name=(null) inode=14953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=45 name=(null) inode=14954 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=46 name=(null) inode=14953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=47 name=(null) inode=14955 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=48 name=(null) inode=14953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=49 name=(null) inode=14956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=50 name=(null) inode=14953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=51 name=(null) inode=14957 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=52 name=(null) inode=14953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=53 name=(null) inode=14958 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=55 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=56 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=57 name=(null) inode=14960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=58 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=59 name=(null) inode=14961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=60 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=61 name=(null) inode=14962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=62 name=(null) inode=14962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=63 name=(null) inode=14963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=64 name=(null) inode=14962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=65 name=(null) inode=14964 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=66 name=(null) inode=14962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=67 name=(null) inode=14965 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=68 name=(null) inode=14962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=69 name=(null) inode=14966 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=70 name=(null) inode=14962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=71 name=(null) inode=14967 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=72 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=73 name=(null) inode=14968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=74 name=(null) inode=14968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=75 name=(null) inode=14969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=76 name=(null) inode=14968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=77 name=(null) inode=14970 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=78 name=(null) inode=14968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=79 name=(null) inode=14971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=80 name=(null) inode=14968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=81 name=(null) inode=14972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=82 name=(null) inode=14968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=83 name=(null) inode=14973 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=84 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=85 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=86 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=87 name=(null) inode=14975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=88 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=89 name=(null) inode=14976 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=90 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=91 name=(null) inode=14977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=92 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=93 name=(null) inode=14978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=94 name=(null) inode=14974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=95 name=(null) inode=14979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=96 name=(null) inode=14959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=97 name=(null) inode=14980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=98 name=(null) inode=14980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=99 name=(null) inode=14981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=100 name=(null) inode=14980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=101 name=(null) inode=14982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=102 name=(null) inode=14980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=103 name=(null) inode=14983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=104 name=(null) inode=14980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=105 name=(null) inode=14984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=106 name=(null) inode=14980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=107 name=(null) inode=14985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PATH item=109 name=(null) inode=14986 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:16.273000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:37:16.345444 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 17 00:37:16.359748 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 17 00:37:16.384703 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:37:16.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.416706 systemd-networkd[1517]: lo: Link UP May 17 00:37:16.416716 systemd-networkd[1517]: lo: Gained carrier May 17 00:37:16.417320 systemd-networkd[1517]: Enumeration completed May 17 00:37:16.417515 systemd[1]: Started systemd-networkd.service. May 17 00:37:16.427290 systemd-networkd[1517]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:37:16.430769 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:37:16.435046 systemd-networkd[1517]: eth0: Link UP May 17 00:37:16.435425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:37:16.435601 systemd-networkd[1517]: eth0: Gained carrier May 17 00:37:16.445615 systemd-networkd[1517]: eth0: DHCPv4 address 172.31.19.224/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 17 00:37:16.504848 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:37:16.511279 systemd[1]: Finished systemd-udev-settle.service. May 17 00:37:16.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.523354 systemd[1]: Starting lvm2-activation-early.service... May 17 00:37:16.601995 lvm[1623]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:37:16.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.629589 systemd[1]: Finished lvm2-activation-early.service. May 17 00:37:16.630270 systemd[1]: Reached target cryptsetup.target. May 17 00:37:16.632131 systemd[1]: Starting lvm2-activation.service... May 17 00:37:16.638135 lvm[1625]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:37:16.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.659738 systemd[1]: Finished lvm2-activation.service. May 17 00:37:16.660621 systemd[1]: Reached target local-fs-pre.target. May 17 00:37:16.661149 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:37:16.661170 systemd[1]: Reached target local-fs.target. May 17 00:37:16.661646 systemd[1]: Reached target machines.target. May 17 00:37:16.663376 systemd[1]: Starting ldconfig.service... May 17 00:37:16.665829 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:37:16.665937 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:16.667529 systemd[1]: Starting systemd-boot-update.service... May 17 00:37:16.670177 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:37:16.673053 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:37:16.675938 systemd[1]: Starting systemd-sysext.service... May 17 00:37:16.688427 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1628 (bootctl) May 17 00:37:16.690435 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:37:16.706738 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:37:16.709510 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:37:16.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.716249 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:37:16.716937 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:37:16.737454 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:37:16.869443 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:37:16.892511 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:37:16.895434 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:37:16.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.897860 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:37:16.900203 systemd-fsck[1640]: fsck.fat 4.2 (2021-01-31) May 17 00:37:16.900203 systemd-fsck[1640]: /dev/nvme0n1p1: 790 files, 120726/258078 clusters May 17 00:37:16.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.902907 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:37:16.905783 systemd[1]: Mounting boot.mount... May 17 00:37:16.937097 systemd[1]: Mounted boot.mount. May 17 00:37:16.939854 (sd-sysext)[1643]: Using extensions 'kubernetes'. May 17 00:37:16.947452 (sd-sysext)[1643]: Merged extensions into '/usr'. May 17 00:37:16.985734 systemd[1]: Finished systemd-boot-update.service. May 17 00:37:16.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:16.988115 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:37:16.990508 systemd[1]: Mounting usr-share-oem.mount... May 17 00:37:16.991751 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:37:16.993872 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:37:16.998570 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:37:17.004603 systemd[1]: Starting modprobe@loop.service... May 17 00:37:17.007842 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:37:17.008063 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:17.008237 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:37:17.017798 systemd[1]: Mounted usr-share-oem.mount. May 17 00:37:17.021245 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:37:17.021500 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:37:17.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.023999 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:37:17.024208 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:37:17.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.025238 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:37:17.025609 systemd[1]: Finished modprobe@loop.service. May 17 00:37:17.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.028560 systemd[1]: Finished systemd-sysext.service. May 17 00:37:17.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.032620 systemd[1]: Starting ensure-sysext.service... May 17 00:37:17.033345 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:37:17.033619 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:37:17.035297 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:37:17.050235 systemd[1]: Reloading. May 17 00:37:17.064314 systemd-tmpfiles[1675]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:37:17.065720 systemd-tmpfiles[1675]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:37:17.069138 systemd-tmpfiles[1675]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:37:17.133951 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2025-05-17T00:37:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:37:17.133993 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2025-05-17T00:37:17Z" level=info msg="torcx already run" May 17 00:37:17.315091 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:37:17.315114 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:37:17.349144 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:37:17.431963 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:37:17.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.439240 systemd[1]: Starting audit-rules.service... May 17 00:37:17.441795 systemd[1]: Starting clean-ca-certificates.service... May 17 00:37:17.444789 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:37:17.452701 systemd[1]: Starting systemd-resolved.service... May 17 00:37:17.456144 systemd[1]: Starting systemd-timesyncd.service... May 17 00:37:17.460337 systemd[1]: Starting systemd-update-utmp.service... May 17 00:37:17.469000 audit[1765]: SYSTEM_BOOT pid=1765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:37:17.469824 systemd-networkd[1517]: eth0: Gained IPv6LL May 17 00:37:17.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.472229 systemd[1]: Finished clean-ca-certificates.service. May 17 00:37:17.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.478186 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:37:17.488923 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:37:17.492046 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:37:17.494595 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:37:17.503946 systemd[1]: Starting modprobe@loop.service... May 17 00:37:17.508531 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:37:17.508785 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:17.508985 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:37:17.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.511545 systemd[1]: Finished systemd-update-utmp.service. May 17 00:37:17.513138 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:37:17.513364 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:37:17.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.515331 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:37:17.515568 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:37:17.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.520021 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:37:17.523432 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:37:17.527259 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:37:17.530484 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:37:17.531630 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:37:17.532827 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:17.533828 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:37:17.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.537766 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:37:17.538038 systemd[1]: Finished modprobe@loop.service. May 17 00:37:17.547018 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:37:17.549122 systemd[1]: Starting modprobe@drm.service... May 17 00:37:17.552671 systemd[1]: Starting modprobe@loop.service... May 17 00:37:17.556850 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:37:17.557087 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:17.557326 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:37:17.558723 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:37:17.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.564839 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:37:17.568051 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:37:17.568274 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:37:17.569660 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:37:17.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.569877 systemd[1]: Finished modprobe@loop.service. May 17 00:37:17.572776 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:37:17.572941 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:37:17.574499 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:37:17.574773 systemd[1]: Finished modprobe@drm.service. May 17 00:37:17.577650 systemd[1]: Finished ensure-sysext.service. May 17 00:37:17.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:17.620649 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:37:17.671000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:37:17.671000 audit[1800]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe234267f0 a2=420 a3=0 items=0 ppid=1760 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:17.671000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:37:17.671977 augenrules[1800]: No rules May 17 00:37:17.672780 systemd[1]: Finished audit-rules.service. May 17 00:37:17.692727 systemd-resolved[1763]: Positive Trust Anchors: May 17 00:37:17.692745 systemd-resolved[1763]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:37:17.692787 systemd-resolved[1763]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:37:17.710810 systemd[1]: Started systemd-timesyncd.service. May 17 00:37:17.711241 systemd[1]: Reached target time-set.target. May 17 00:37:17.716436 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:37:17.716462 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:37:17.733010 systemd-resolved[1763]: Defaulting to hostname 'linux'. May 17 00:37:17.735246 systemd[1]: Started systemd-resolved.service. May 17 00:37:17.736037 systemd[1]: Reached target network.target. May 17 00:37:17.736448 systemd[1]: Reached target network-online.target. May 17 00:37:17.736877 systemd[1]: Reached target nss-lookup.target. May 17 00:37:18.673045 systemd-timesyncd[1764]: Contacted time server 66.118.228.14:123 (0.flatcar.pool.ntp.org). May 17 00:37:18.673053 systemd-resolved[1763]: Clock change detected. Flushing caches. May 17 00:37:18.673392 systemd-timesyncd[1764]: Initial clock synchronization to Sat 2025-05-17 00:37:18.672882 UTC. May 17 00:37:18.808729 ldconfig[1627]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:37:18.815733 systemd[1]: Finished ldconfig.service. May 17 00:37:18.818236 systemd[1]: Starting systemd-update-done.service... May 17 00:37:18.828246 systemd[1]: Finished systemd-update-done.service. May 17 00:37:18.829081 systemd[1]: Reached target sysinit.target. May 17 00:37:18.830405 systemd[1]: Started motdgen.path. May 17 00:37:18.831251 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:37:18.832205 systemd[1]: Started logrotate.timer. May 17 00:37:18.833201 systemd[1]: Started mdadm.timer. May 17 00:37:18.833852 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:37:18.834398 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:37:18.834445 systemd[1]: Reached target paths.target. May 17 00:37:18.834843 systemd[1]: Reached target timers.target. May 17 00:37:18.835590 systemd[1]: Listening on dbus.socket. May 17 00:37:18.837322 systemd[1]: Starting docker.socket... May 17 00:37:18.840597 systemd[1]: Listening on sshd.socket. May 17 00:37:18.841697 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:18.842650 systemd[1]: Listening on docker.socket. May 17 00:37:18.843394 systemd[1]: Reached target sockets.target. May 17 00:37:18.844027 systemd[1]: Reached target basic.target. May 17 00:37:18.844709 systemd[1]: System is tainted: cgroupsv1 May 17 00:37:18.844768 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:37:18.844802 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:37:18.846254 systemd[1]: Started amazon-ssm-agent.service. May 17 00:37:18.848294 systemd[1]: Starting containerd.service... May 17 00:37:18.850451 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 17 00:37:18.852788 systemd[1]: Starting dbus.service... May 17 00:37:18.855162 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:37:18.857531 systemd[1]: Starting extend-filesystems.service... May 17 00:37:18.861479 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:37:18.865604 systemd[1]: Starting kubelet.service... May 17 00:37:18.877532 systemd[1]: Starting motdgen.service... May 17 00:37:18.883117 systemd[1]: Started nvidia.service. May 17 00:37:18.890390 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:37:18.895124 systemd[1]: Starting sshd-keygen.service... May 17 00:37:18.901799 systemd[1]: Starting systemd-logind.service... May 17 00:37:18.902478 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:37:18.902607 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:37:18.905892 systemd[1]: Starting update-engine.service... May 17 00:37:18.910694 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:37:18.955483 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:37:18.955809 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:37:19.027834 jq[1831]: true May 17 00:37:19.036644 jq[1817]: false May 17 00:37:19.037232 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:37:19.037568 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:37:19.065134 jq[1850]: true May 17 00:37:19.089314 extend-filesystems[1818]: Found loop1 May 17 00:37:19.122231 extend-filesystems[1818]: Found nvme0n1 May 17 00:37:19.123744 extend-filesystems[1818]: Found nvme0n1p1 May 17 00:37:19.124699 extend-filesystems[1818]: Found nvme0n1p2 May 17 00:37:19.126336 extend-filesystems[1818]: Found nvme0n1p3 May 17 00:37:19.128009 extend-filesystems[1818]: Found usr May 17 00:37:19.130002 extend-filesystems[1818]: Found nvme0n1p4 May 17 00:37:19.130892 extend-filesystems[1818]: Found nvme0n1p6 May 17 00:37:19.136766 dbus-daemon[1815]: [system] SELinux support is enabled May 17 00:37:19.137361 extend-filesystems[1818]: Found nvme0n1p7 May 17 00:37:19.142833 extend-filesystems[1818]: Found nvme0n1p9 May 17 00:37:19.142833 extend-filesystems[1818]: Checking size of /dev/nvme0n1p9 May 17 00:37:19.144836 systemd[1]: Started dbus.service. May 17 00:37:19.148738 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:37:19.148778 systemd[1]: Reached target system-config.target. May 17 00:37:19.149423 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:37:19.149451 systemd[1]: Reached target user-config.target. May 17 00:37:19.162051 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:37:19.162380 systemd[1]: Finished motdgen.service. May 17 00:37:19.205154 dbus-daemon[1815]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1517 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 17 00:37:19.212829 systemd[1]: Starting systemd-hostnamed.service... May 17 00:37:19.223102 extend-filesystems[1818]: Resized partition /dev/nvme0n1p9 May 17 00:37:19.234063 amazon-ssm-agent[1812]: 2025/05/17 00:37:19 Failed to load instance info from vault. RegistrationKey does not exist. May 17 00:37:19.247553 extend-filesystems[1886]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:37:19.253942 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 17 00:37:19.263814 amazon-ssm-agent[1812]: Initializing new seelog logger May 17 00:37:19.271107 amazon-ssm-agent[1812]: New Seelog Logger Creation Complete May 17 00:37:19.271238 amazon-ssm-agent[1812]: 2025/05/17 00:37:19 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:37:19.271238 amazon-ssm-agent[1812]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 17 00:37:19.276859 amazon-ssm-agent[1812]: 2025/05/17 00:37:19 processing appconfig overrides May 17 00:37:19.350984 update_engine[1828]: I0517 00:37:19.289211 1828 main.cc:92] Flatcar Update Engine starting May 17 00:37:19.350984 update_engine[1828]: I0517 00:37:19.299762 1828 update_check_scheduler.cc:74] Next update check in 7m26s May 17 00:37:19.351366 env[1840]: time="2025-05-17T00:37:19.350590527Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:37:19.295497 systemd[1]: Started update-engine.service. May 17 00:37:19.298450 systemd[1]: Started locksmithd.service. May 17 00:37:19.364947 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 17 00:37:19.381720 extend-filesystems[1886]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 17 00:37:19.381720 extend-filesystems[1886]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:37:19.381720 extend-filesystems[1886]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 17 00:37:19.389261 extend-filesystems[1818]: Resized filesystem in /dev/nvme0n1p9 May 17 00:37:19.390044 bash[1892]: Updated "/home/core/.ssh/authorized_keys" May 17 00:37:19.382068 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:37:19.382435 systemd[1]: Finished extend-filesystems.service. May 17 00:37:19.387253 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:37:19.469545 systemd-logind[1825]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:37:19.469580 systemd-logind[1825]: Watching system buttons on /dev/input/event2 (Sleep Button) May 17 00:37:19.469604 systemd-logind[1825]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:37:19.469851 systemd-logind[1825]: New seat seat0. May 17 00:37:19.474892 systemd[1]: Started systemd-logind.service. May 17 00:37:19.518759 systemd[1]: nvidia.service: Deactivated successfully. May 17 00:37:19.553836 env[1840]: time="2025-05-17T00:37:19.553743897Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:37:19.554183 env[1840]: time="2025-05-17T00:37:19.554156208Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:37:19.560165 env[1840]: time="2025-05-17T00:37:19.560112060Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:37:19.560348 env[1840]: time="2025-05-17T00:37:19.560324340Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:37:19.560838 env[1840]: time="2025-05-17T00:37:19.560805032Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:37:19.560976 env[1840]: time="2025-05-17T00:37:19.560956383Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:37:19.561085 env[1840]: time="2025-05-17T00:37:19.561067180Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:37:19.561159 env[1840]: time="2025-05-17T00:37:19.561144082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:37:19.561366 env[1840]: time="2025-05-17T00:37:19.561345413Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:37:19.561760 env[1840]: time="2025-05-17T00:37:19.561734845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:37:19.562210 env[1840]: time="2025-05-17T00:37:19.562179339Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:37:19.562310 env[1840]: time="2025-05-17T00:37:19.562292930Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:37:19.562455 env[1840]: time="2025-05-17T00:37:19.562436021Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:37:19.562557 env[1840]: time="2025-05-17T00:37:19.562540854Z" level=info msg="metadata content store policy set" policy=shared May 17 00:37:19.570458 env[1840]: time="2025-05-17T00:37:19.570410206Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:37:19.570895 env[1840]: time="2025-05-17T00:37:19.570865212Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:37:19.571074 env[1840]: time="2025-05-17T00:37:19.571046327Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:37:19.571204 env[1840]: time="2025-05-17T00:37:19.571187988Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:37:19.571351 env[1840]: time="2025-05-17T00:37:19.571334926Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:37:19.571660 env[1840]: time="2025-05-17T00:37:19.571638292Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:37:19.571754 env[1840]: time="2025-05-17T00:37:19.571739492Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:37:19.571828 env[1840]: time="2025-05-17T00:37:19.571815625Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:37:19.571907 env[1840]: time="2025-05-17T00:37:19.571894193Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:37:19.572023 env[1840]: time="2025-05-17T00:37:19.572008385Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:37:19.572096 env[1840]: time="2025-05-17T00:37:19.572081966Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:37:19.572464 env[1840]: time="2025-05-17T00:37:19.572392492Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:37:19.572727 env[1840]: time="2025-05-17T00:37:19.572706993Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:37:19.572941 env[1840]: time="2025-05-17T00:37:19.572902648Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:37:19.577408 env[1840]: time="2025-05-17T00:37:19.577369684Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:37:19.577618 env[1840]: time="2025-05-17T00:37:19.577596795Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:37:19.577713 env[1840]: time="2025-05-17T00:37:19.577697778Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:37:19.577840 env[1840]: time="2025-05-17T00:37:19.577823866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:37:19.577946 env[1840]: time="2025-05-17T00:37:19.577907710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578044 env[1840]: time="2025-05-17T00:37:19.578027577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578116 env[1840]: time="2025-05-17T00:37:19.578103049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578218 env[1840]: time="2025-05-17T00:37:19.578203382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578291 env[1840]: time="2025-05-17T00:37:19.578278610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578362 env[1840]: time="2025-05-17T00:37:19.578349464Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578432 env[1840]: time="2025-05-17T00:37:19.578419207Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:37:19.578515 env[1840]: time="2025-05-17T00:37:19.578501839Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:37:19.579337 env[1840]: time="2025-05-17T00:37:19.579309077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:37:19.579463 env[1840]: time="2025-05-17T00:37:19.579445672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:37:19.579541 env[1840]: time="2025-05-17T00:37:19.579525414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:37:19.579619 env[1840]: time="2025-05-17T00:37:19.579604817Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:37:19.579702 env[1840]: time="2025-05-17T00:37:19.579684894Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:37:19.579786 env[1840]: time="2025-05-17T00:37:19.579772088Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:37:19.579951 env[1840]: time="2025-05-17T00:37:19.579931317Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:37:19.580072 env[1840]: time="2025-05-17T00:37:19.580056059Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:37:19.580483 env[1840]: time="2025-05-17T00:37:19.580405659Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:37:19.583900 env[1840]: time="2025-05-17T00:37:19.582501970Z" level=info msg="Connect containerd service" May 17 00:37:19.583900 env[1840]: time="2025-05-17T00:37:19.582577528Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:37:19.590413 env[1840]: time="2025-05-17T00:37:19.590367350Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:37:19.591275 env[1840]: time="2025-05-17T00:37:19.591243933Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:37:19.592642 env[1840]: time="2025-05-17T00:37:19.592613162Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:37:19.592960 systemd[1]: Started containerd.service. May 17 00:37:19.594538 env[1840]: time="2025-05-17T00:37:19.594511855Z" level=info msg="containerd successfully booted in 0.288678s" May 17 00:37:19.596687 env[1840]: time="2025-05-17T00:37:19.596625068Z" level=info msg="Start subscribing containerd event" May 17 00:37:19.596797 env[1840]: time="2025-05-17T00:37:19.596713445Z" level=info msg="Start recovering state" May 17 00:37:19.596847 env[1840]: time="2025-05-17T00:37:19.596796649Z" level=info msg="Start event monitor" May 17 00:37:19.596847 env[1840]: time="2025-05-17T00:37:19.596819654Z" level=info msg="Start snapshots syncer" May 17 00:37:19.596847 env[1840]: time="2025-05-17T00:37:19.596835025Z" level=info msg="Start cni network conf syncer for default" May 17 00:37:19.596979 env[1840]: time="2025-05-17T00:37:19.596849216Z" level=info msg="Start streaming server" May 17 00:37:19.639391 coreos-metadata[1814]: May 17 00:37:19.638 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:37:19.646351 coreos-metadata[1814]: May 17 00:37:19.646 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 17 00:37:19.647527 coreos-metadata[1814]: May 17 00:37:19.647 INFO Fetch successful May 17 00:37:19.647527 coreos-metadata[1814]: May 17 00:37:19.647 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 17 00:37:19.647972 coreos-metadata[1814]: May 17 00:37:19.647 INFO Fetch successful May 17 00:37:19.651091 unknown[1814]: wrote ssh authorized keys file for user: core May 17 00:37:19.674830 dbus-daemon[1815]: [system] Successfully activated service 'org.freedesktop.hostname1' May 17 00:37:19.675067 systemd[1]: Started systemd-hostnamed.service. May 17 00:37:19.677365 dbus-daemon[1815]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1882 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 17 00:37:19.683129 systemd[1]: Starting polkit.service... May 17 00:37:19.695708 update-ssh-keys[1957]: Updated "/home/core/.ssh/authorized_keys" May 17 00:37:19.694539 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 17 00:37:19.714145 polkitd[1962]: Started polkitd version 121 May 17 00:37:19.735705 polkitd[1962]: Loading rules from directory /etc/polkit-1/rules.d May 17 00:37:19.735784 polkitd[1962]: Loading rules from directory /usr/share/polkit-1/rules.d May 17 00:37:19.740498 polkitd[1962]: Finished loading, compiling and executing 2 rules May 17 00:37:19.741212 dbus-daemon[1815]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 17 00:37:19.741424 systemd[1]: Started polkit.service. May 17 00:37:19.743632 polkitd[1962]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 17 00:37:19.770428 systemd-hostnamed[1882]: Hostname set to (transient) May 17 00:37:19.770545 systemd-resolved[1763]: System hostname changed to 'ip-172-31-19-224'. May 17 00:37:19.979509 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Create new startup processor May 17 00:37:19.988728 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [LongRunningPluginsManager] registered plugins: {} May 17 00:37:19.988906 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing bookkeeping folders May 17 00:37:19.989025 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO removing the completed state files May 17 00:37:19.989096 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing bookkeeping folders for long running plugins May 17 00:37:19.989153 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 17 00:37:19.989212 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing healthcheck folders for long running plugins May 17 00:37:19.989286 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing locations for inventory plugin May 17 00:37:19.989359 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing default location for custom inventory May 17 00:37:19.989418 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing default location for file inventory May 17 00:37:19.989475 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Initializing default location for role inventory May 17 00:37:19.989533 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Init the cloudwatchlogs publisher May 17 00:37:19.989591 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:runPowerShellScript May 17 00:37:19.989654 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:runDockerAction May 17 00:37:19.989712 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:configurePackage May 17 00:37:19.989792 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:runDocument May 17 00:37:19.989850 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:softwareInventory May 17 00:37:19.989908 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:configureDocker May 17 00:37:19.989992 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:refreshAssociation May 17 00:37:19.990054 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:downloadContent May 17 00:37:19.990118 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform independent plugin aws:updateSsmAgent May 17 00:37:19.990176 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Successfully loaded platform dependent plugin aws:runShellScript May 17 00:37:19.990234 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 17 00:37:19.990296 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO OS: linux, Arch: amd64 May 17 00:37:19.991748 amazon-ssm-agent[1812]: datastore file /var/lib/amazon/ssm/i-0ecd3f66bd0525da8/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 17 00:37:20.082589 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessageGatewayService] Starting session document processing engine... May 17 00:37:20.176777 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessageGatewayService] [EngineProcessor] Starting May 17 00:37:20.271128 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 17 00:37:20.273580 locksmithd[1898]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:37:20.365560 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0ecd3f66bd0525da8, requestId: c1607ab7-63bf-4559-86d8-b1da162b9384 May 17 00:37:20.460270 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] Starting document processing engine... May 17 00:37:20.555231 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 17 00:37:20.650259 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 17 00:37:20.663986 sshd_keygen[1852]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:37:20.703515 systemd[1]: Finished sshd-keygen.service. May 17 00:37:20.706840 systemd[1]: Starting issuegen.service... May 17 00:37:20.716770 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:37:20.717108 systemd[1]: Finished issuegen.service. May 17 00:37:20.720426 systemd[1]: Starting systemd-user-sessions.service... May 17 00:37:20.731690 systemd[1]: Finished systemd-user-sessions.service. May 17 00:37:20.735173 systemd[1]: Started getty@tty1.service. May 17 00:37:20.738216 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:37:20.739785 systemd[1]: Reached target getty.target. May 17 00:37:20.745621 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] Starting message polling May 17 00:37:20.841527 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] Starting send replies to MDS May 17 00:37:20.936966 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [instanceID=i-0ecd3f66bd0525da8] Starting association polling May 17 00:37:21.032814 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 17 00:37:21.128958 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [Association] Launching response handler May 17 00:37:21.225227 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 17 00:37:21.321679 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 17 00:37:21.418385 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 17 00:37:21.515205 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [MessageGatewayService] listening reply. May 17 00:37:21.612313 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:37:21.709854 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [OfflineService] Starting document processing engine... May 17 00:37:21.765180 systemd[1]: Started kubelet.service. May 17 00:37:21.766724 systemd[1]: Reached target multi-user.target. May 17 00:37:21.769977 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:37:21.780702 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:37:21.781083 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:37:21.787999 systemd[1]: Startup finished in 7.393s (kernel) + 10.557s (userspace) = 17.950s. May 17 00:37:21.807236 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [OfflineService] [EngineProcessor] Starting May 17 00:37:21.904894 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [OfflineService] [EngineProcessor] Initial processing May 17 00:37:22.002876 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [OfflineService] Starting message polling May 17 00:37:22.101109 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [OfflineService] Starting send replies to MDS May 17 00:37:22.199357 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [LongRunningPluginsManager] starting long running plugin manager May 17 00:37:22.298071 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 17 00:37:22.396630 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 17 00:37:22.495404 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [StartupProcessor] Executing startup processor tasks May 17 00:37:22.594709 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 17 00:37:22.693916 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 17 00:37:22.793986 amazon-ssm-agent[1812]: 2025-05-17 00:37:19 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 17 00:37:22.893714 amazon-ssm-agent[1812]: 2025-05-17 00:37:20 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ecd3f66bd0525da8?role=subscribe&stream=input May 17 00:37:22.993524 amazon-ssm-agent[1812]: 2025-05-17 00:37:20 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0ecd3f66bd0525da8?role=subscribe&stream=input May 17 00:37:23.065421 kubelet[2040]: E0517 00:37:23.065209 2040 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:37:23.066993 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:37:23.067213 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:37:23.093805 amazon-ssm-agent[1812]: 2025-05-17 00:37:20 INFO [MessageGatewayService] Starting receiving message from control channel May 17 00:37:23.194102 amazon-ssm-agent[1812]: 2025-05-17 00:37:20 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 17 00:37:28.805960 systemd[1]: Created slice system-sshd.slice. May 17 00:37:28.807645 systemd[1]: Started sshd@0-172.31.19.224:22-139.178.68.195:53698.service. May 17 00:37:29.006939 sshd[2048]: Accepted publickey for core from 139.178.68.195 port 53698 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:29.010841 sshd[2048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:29.026870 systemd[1]: Created slice user-500.slice. May 17 00:37:29.027964 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:37:29.032599 systemd-logind[1825]: New session 1 of user core. May 17 00:37:29.043887 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:37:29.046568 systemd[1]: Starting user@500.service... May 17 00:37:29.054071 (systemd)[2053]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:29.160702 systemd[2053]: Queued start job for default target default.target. May 17 00:37:29.161790 systemd[2053]: Reached target paths.target. May 17 00:37:29.161823 systemd[2053]: Reached target sockets.target. May 17 00:37:29.161844 systemd[2053]: Reached target timers.target. May 17 00:37:29.161872 systemd[2053]: Reached target basic.target. May 17 00:37:29.162070 systemd[1]: Started user@500.service. May 17 00:37:29.163054 systemd[1]: Started session-1.scope. May 17 00:37:29.168466 systemd[2053]: Reached target default.target. May 17 00:37:29.169771 systemd[2053]: Startup finished in 108ms. May 17 00:37:29.301695 systemd[1]: Started sshd@1-172.31.19.224:22-139.178.68.195:53712.service. May 17 00:37:29.459302 sshd[2062]: Accepted publickey for core from 139.178.68.195 port 53712 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:29.460780 sshd[2062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:29.465695 systemd-logind[1825]: New session 2 of user core. May 17 00:37:29.466092 systemd[1]: Started session-2.scope. May 17 00:37:29.591465 sshd[2062]: pam_unix(sshd:session): session closed for user core May 17 00:37:29.594825 systemd[1]: sshd@1-172.31.19.224:22-139.178.68.195:53712.service: Deactivated successfully. May 17 00:37:29.596225 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:37:29.596638 systemd-logind[1825]: Session 2 logged out. Waiting for processes to exit. May 17 00:37:29.598005 systemd-logind[1825]: Removed session 2. May 17 00:37:29.617074 systemd[1]: Started sshd@2-172.31.19.224:22-139.178.68.195:53728.service. May 17 00:37:29.777182 sshd[2069]: Accepted publickey for core from 139.178.68.195 port 53728 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:29.779067 sshd[2069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:29.784867 systemd[1]: Started session-3.scope. May 17 00:37:29.785511 systemd-logind[1825]: New session 3 of user core. May 17 00:37:29.910859 sshd[2069]: pam_unix(sshd:session): session closed for user core May 17 00:37:29.914063 systemd[1]: sshd@2-172.31.19.224:22-139.178.68.195:53728.service: Deactivated successfully. May 17 00:37:29.915231 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:37:29.917486 systemd-logind[1825]: Session 3 logged out. Waiting for processes to exit. May 17 00:37:29.919042 systemd-logind[1825]: Removed session 3. May 17 00:37:29.932755 systemd[1]: Started sshd@3-172.31.19.224:22-139.178.68.195:53738.service. May 17 00:37:30.087003 sshd[2076]: Accepted publickey for core from 139.178.68.195 port 53738 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:30.088814 sshd[2076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:30.094519 systemd[1]: Started session-4.scope. May 17 00:37:30.094820 systemd-logind[1825]: New session 4 of user core. May 17 00:37:30.219898 sshd[2076]: pam_unix(sshd:session): session closed for user core May 17 00:37:30.223123 systemd[1]: sshd@3-172.31.19.224:22-139.178.68.195:53738.service: Deactivated successfully. May 17 00:37:30.224406 systemd-logind[1825]: Session 4 logged out. Waiting for processes to exit. May 17 00:37:30.224509 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:37:30.226040 systemd-logind[1825]: Removed session 4. May 17 00:37:30.244383 systemd[1]: Started sshd@4-172.31.19.224:22-139.178.68.195:53754.service. May 17 00:37:30.403143 sshd[2083]: Accepted publickey for core from 139.178.68.195 port 53754 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:30.404244 sshd[2083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:30.410188 systemd[1]: Started session-5.scope. May 17 00:37:30.410486 systemd-logind[1825]: New session 5 of user core. May 17 00:37:30.554100 sudo[2087]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:37:30.554342 sudo[2087]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:37:30.562199 dbus-daemon[1815]: Н\xb0\u000eAV: received setenforce notice (enforcing=-1619645488) May 17 00:37:30.563979 sudo[2087]: pam_unix(sudo:session): session closed for user root May 17 00:37:30.588623 sshd[2083]: pam_unix(sshd:session): session closed for user core May 17 00:37:30.592504 systemd[1]: sshd@4-172.31.19.224:22-139.178.68.195:53754.service: Deactivated successfully. May 17 00:37:30.593531 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:37:30.594794 systemd-logind[1825]: Session 5 logged out. Waiting for processes to exit. May 17 00:37:30.595788 systemd-logind[1825]: Removed session 5. May 17 00:37:30.613519 systemd[1]: Started sshd@5-172.31.19.224:22-139.178.68.195:53760.service. May 17 00:37:30.776104 sshd[2091]: Accepted publickey for core from 139.178.68.195 port 53760 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:30.777810 sshd[2091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:30.784173 systemd[1]: Started session-6.scope. May 17 00:37:30.784453 systemd-logind[1825]: New session 6 of user core. May 17 00:37:30.891534 sudo[2096]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:37:30.891884 sudo[2096]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:37:30.895561 sudo[2096]: pam_unix(sudo:session): session closed for user root May 17 00:37:30.901346 sudo[2095]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:37:30.901676 sudo[2095]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:37:30.913581 systemd[1]: Stopping audit-rules.service... May 17 00:37:30.918653 kernel: kauditd_printk_skb: 175 callbacks suppressed May 17 00:37:30.918754 kernel: audit: type=1305 audit(1747442250.914:153): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:37:30.914000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:37:30.916725 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:37:30.919150 auditctl[2099]: No rules May 17 00:37:30.917045 systemd[1]: Stopped audit-rules.service. May 17 00:37:30.914000 audit[2099]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd63ed3000 a2=420 a3=0 items=0 ppid=1 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.919879 systemd[1]: Starting audit-rules.service... May 17 00:37:30.925012 kernel: audit: type=1300 audit(1747442250.914:153): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd63ed3000 a2=420 a3=0 items=0 ppid=1 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:30.914000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:37:30.928944 kernel: audit: type=1327 audit(1747442250.914:153): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:37:30.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.934972 kernel: audit: type=1131 audit(1747442250.916:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.947675 augenrules[2117]: No rules May 17 00:37:30.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.949000 audit[2095]: USER_END pid=2095 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:30.950067 sudo[2095]: pam_unix(sudo:session): session closed for user root May 17 00:37:30.948499 systemd[1]: Finished audit-rules.service. May 17 00:37:30.958464 kernel: audit: type=1130 audit(1747442250.947:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.958554 kernel: audit: type=1106 audit(1747442250.949:156): pid=2095 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:30.958948 kernel: audit: type=1104 audit(1747442250.949:157): pid=2095 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:30.949000 audit[2095]: CRED_DISP pid=2095 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:30.976878 sshd[2091]: pam_unix(sshd:session): session closed for user core May 17 00:37:30.977000 audit[2091]: USER_END pid=2091 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:30.980581 systemd[1]: sshd@5-172.31.19.224:22-139.178.68.195:53760.service: Deactivated successfully. May 17 00:37:30.981612 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:37:30.983950 kernel: audit: type=1106 audit(1747442250.977:158): pid=2091 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:30.977000 audit[2091]: CRED_DISP pid=2091 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:30.984616 systemd-logind[1825]: Session 6 logged out. Waiting for processes to exit. May 17 00:37:30.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.224:22-139.178.68.195:53760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:30.990974 systemd-logind[1825]: Removed session 6. May 17 00:37:30.995579 kernel: audit: type=1104 audit(1747442250.977:159): pid=2091 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:30.995681 kernel: audit: type=1131 audit(1747442250.977:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.224:22-139.178.68.195:53760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:31.000083 systemd[1]: Started sshd@6-172.31.19.224:22-139.178.68.195:53770.service. May 17 00:37:30.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.224:22-139.178.68.195:53770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:31.153000 audit[2124]: USER_ACCT pid=2124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.154685 sshd[2124]: Accepted publickey for core from 139.178.68.195 port 53770 ssh2: RSA SHA256:I5cGDzOOPhNK8a4J4SFPiuUQivu3TK8ocBzhX4AkN30 May 17 00:37:31.155000 audit[2124]: CRED_ACQ pid=2124 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.155000 audit[2124]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda91175f0 a2=3 a3=0 items=0 ppid=1 pid=2124 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:31.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:37:31.157022 sshd[2124]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:37:31.163129 systemd[1]: Started session-7.scope. May 17 00:37:31.163410 systemd-logind[1825]: New session 7 of user core. May 17 00:37:31.170000 audit[2124]: USER_START pid=2124 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.172000 audit[2127]: CRED_ACQ pid=2127 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:31.264000 audit[2128]: USER_ACCT pid=2128 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:31.264000 audit[2128]: CRED_REFR pid=2128 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:31.265085 sudo[2128]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:37:31.265337 sudo[2128]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:37:31.266000 audit[2128]: USER_START pid=2128 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:31.282200 systemd[1]: Starting coreos-metadata.service... May 17 00:37:31.362623 coreos-metadata[2132]: May 17 00:37:31.362 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 17 00:37:31.363893 coreos-metadata[2132]: May 17 00:37:31.363 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1 May 17 00:37:31.364852 coreos-metadata[2132]: May 17 00:37:31.364 INFO Fetch successful May 17 00:37:31.364852 coreos-metadata[2132]: May 17 00:37:31.364 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1 May 17 00:37:31.365764 coreos-metadata[2132]: May 17 00:37:31.365 INFO Fetch successful May 17 00:37:31.366095 coreos-metadata[2132]: May 17 00:37:31.365 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1 May 17 00:37:31.367010 coreos-metadata[2132]: May 17 00:37:31.366 INFO Fetch successful May 17 00:37:31.367010 coreos-metadata[2132]: May 17 00:37:31.367 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1 May 17 00:37:31.368091 coreos-metadata[2132]: May 17 00:37:31.368 INFO Fetch successful May 17 00:37:31.368091 coreos-metadata[2132]: May 17 00:37:31.368 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1 May 17 00:37:31.368905 coreos-metadata[2132]: May 17 00:37:31.368 INFO Fetch successful May 17 00:37:31.369003 coreos-metadata[2132]: May 17 00:37:31.368 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1 May 17 00:37:31.370409 coreos-metadata[2132]: May 17 00:37:31.370 INFO Fetch successful May 17 00:37:31.370409 coreos-metadata[2132]: May 17 00:37:31.370 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1 May 17 00:37:31.371415 coreos-metadata[2132]: May 17 00:37:31.371 INFO Fetch successful May 17 00:37:31.371415 coreos-metadata[2132]: May 17 00:37:31.371 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1 May 17 00:37:31.372405 coreos-metadata[2132]: May 17 00:37:31.372 INFO Fetch successful May 17 00:37:31.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:31.383908 systemd[1]: Finished coreos-metadata.service. May 17 00:37:32.463379 systemd[1]: Stopped kubelet.service. May 17 00:37:32.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:32.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:32.467354 systemd[1]: Starting kubelet.service... May 17 00:37:32.504805 systemd[1]: Reloading. May 17 00:37:32.626526 /usr/lib/systemd/system-generators/torcx-generator[2189]: time="2025-05-17T00:37:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:37:32.632086 /usr/lib/systemd/system-generators/torcx-generator[2189]: time="2025-05-17T00:37:32Z" level=info msg="torcx already run" May 17 00:37:32.766496 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:37:32.766523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:37:32.785954 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:37:32.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:32.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:32.900569 systemd[1]: Stopping kubelet.service... May 17 00:37:32.901363 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:37:32.901679 systemd[1]: Stopped kubelet.service. May 17 00:37:32.905606 systemd[1]: Starting kubelet.service... May 17 00:37:33.177203 systemd[1]: Started kubelet.service. May 17 00:37:33.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:33.227017 kubelet[2266]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:33.227017 kubelet[2266]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:37:33.227017 kubelet[2266]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:37:33.227547 kubelet[2266]: I0517 00:37:33.227122 2266 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:37:33.694973 kubelet[2266]: I0517 00:37:33.694916 2266 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:37:33.694973 kubelet[2266]: I0517 00:37:33.694965 2266 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:37:33.695301 kubelet[2266]: I0517 00:37:33.695279 2266 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:37:33.759119 kubelet[2266]: I0517 00:37:33.759058 2266 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:37:33.794587 kubelet[2266]: E0517 00:37:33.794542 2266 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:37:33.794587 kubelet[2266]: I0517 00:37:33.794582 2266 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:37:33.799657 kubelet[2266]: I0517 00:37:33.799624 2266 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:37:33.800064 kubelet[2266]: I0517 00:37:33.800041 2266 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:37:33.800229 kubelet[2266]: I0517 00:37:33.800189 2266 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:37:33.800441 kubelet[2266]: I0517 00:37:33.800228 2266 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"172.31.19.224","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":1} May 17 00:37:33.800600 kubelet[2266]: I0517 00:37:33.800450 2266 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:37:33.800600 kubelet[2266]: I0517 00:37:33.800465 2266 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:37:33.800600 kubelet[2266]: I0517 00:37:33.800597 2266 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:33.808360 kubelet[2266]: I0517 00:37:33.808304 2266 kubelet.go:408] "Attempting to sync node with API server" May 17 00:37:33.808360 kubelet[2266]: I0517 00:37:33.808355 2266 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:37:33.808539 kubelet[2266]: I0517 00:37:33.808397 2266 kubelet.go:314] "Adding apiserver pod source" May 17 00:37:33.808539 kubelet[2266]: I0517 00:37:33.808415 2266 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:37:33.808717 kubelet[2266]: E0517 00:37:33.808681 2266 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:33.808813 kubelet[2266]: E0517 00:37:33.808731 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:33.813859 kubelet[2266]: I0517 00:37:33.813831 2266 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:37:33.814423 kubelet[2266]: I0517 00:37:33.814400 2266 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:37:33.814552 kubelet[2266]: W0517 00:37:33.814513 2266 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:37:33.818699 kubelet[2266]: I0517 00:37:33.818662 2266 server.go:1274] "Started kubelet" May 17 00:37:33.827350 kubelet[2266]: W0517 00:37:33.827320 2266 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "172.31.19.224" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope May 17 00:37:33.827516 kubelet[2266]: E0517 00:37:33.827503 2266 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"172.31.19.224\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:37:33.827650 kubelet[2266]: W0517 00:37:33.827639 2266 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope May 17 00:37:33.827745 kubelet[2266]: E0517 00:37:33.827732 2266 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" May 17 00:37:33.828036 kubelet[2266]: I0517 00:37:33.827998 2266 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:37:33.829944 kubelet[2266]: I0517 00:37:33.829900 2266 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:37:33.829000 audit[2266]: AVC avc: denied { mac_admin } for pid=2266 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.829000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:33.829000 audit[2266]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00073f080 a1=c000882138 a2=c00073f050 a3=25 items=0 ppid=1 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:33.829000 audit[2266]: AVC avc: denied { mac_admin } for pid=2266 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.829000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:33.829000 audit[2266]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00040b100 a1=c000882150 a2=c00073f110 a3=25 items=0 ppid=1 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:33.830366 kubelet[2266]: I0517 00:37:33.830071 2266 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:37:33.830366 kubelet[2266]: I0517 00:37:33.830110 2266 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:37:33.830366 kubelet[2266]: I0517 00:37:33.830164 2266 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:37:33.830634 kubelet[2266]: I0517 00:37:33.830595 2266 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:37:33.831605 kubelet[2266]: I0517 00:37:33.831530 2266 server.go:449] "Adding debug handlers to kubelet server" May 17 00:37:33.832561 kubelet[2266]: I0517 00:37:33.832373 2266 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:37:33.836519 kubelet[2266]: I0517 00:37:33.836168 2266 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:37:33.836519 kubelet[2266]: I0517 00:37:33.836277 2266 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:37:33.836519 kubelet[2266]: I0517 00:37:33.836323 2266 reconciler.go:26] "Reconciler: start to sync state" May 17 00:37:33.838245 kubelet[2266]: E0517 00:37:33.838216 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:33.838980 kubelet[2266]: I0517 00:37:33.838937 2266 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:37:33.843787 kubelet[2266]: I0517 00:37:33.843759 2266 factory.go:221] Registration of the containerd container factory successfully May 17 00:37:33.843787 kubelet[2266]: I0517 00:37:33.843782 2266 factory.go:221] Registration of the systemd container factory successfully May 17 00:37:33.857310 kubelet[2266]: E0517 00:37:33.855138 2266 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:37:33.870680 kubelet[2266]: E0517 00:37:33.868452 2266 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.19.224.18402978b45de8e7 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.19.224,UID:172.31.19.224,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:172.31.19.224,},FirstTimestamp:2025-05-17 00:37:33.818620135 +0000 UTC m=+0.635439417,LastTimestamp:2025-05-17 00:37:33.818620135 +0000 UTC m=+0.635439417,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.19.224,}" May 17 00:37:33.872699 kubelet[2266]: E0517 00:37:33.872660 2266 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.19.224\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" May 17 00:37:33.872861 kubelet[2266]: W0517 00:37:33.872802 2266 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope May 17 00:37:33.872861 kubelet[2266]: E0517 00:37:33.872837 2266 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" May 17 00:37:33.878965 kubelet[2266]: I0517 00:37:33.878910 2266 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:37:33.879139 kubelet[2266]: I0517 00:37:33.879125 2266 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:37:33.879223 kubelet[2266]: I0517 00:37:33.879214 2266 state_mem.go:36] "Initialized new in-memory state store" May 17 00:37:33.882448 kubelet[2266]: E0517 00:37:33.882342 2266 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.19.224.18402978b50e305d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.19.224,UID:172.31.19.224,APIVersion:,ResourceVersion:,FieldPath:,},Reason:CgroupV1,Message:Cgroup v1 support is in maintenance mode, please migrate to Cgroup v2.,Source:EventSource{Component:kubelet,Host:172.31.19.224,},FirstTimestamp:2025-05-17 00:37:33.830172765 +0000 UTC m=+0.646992025,LastTimestamp:2025-05-17 00:37:33.830172765 +0000 UTC m=+0.646992025,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.19.224,}" May 17 00:37:33.882882 kubelet[2266]: I0517 00:37:33.882867 2266 policy_none.go:49] "None policy: Start" May 17 00:37:33.883916 kubelet[2266]: I0517 00:37:33.883901 2266 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:37:33.884049 kubelet[2266]: I0517 00:37:33.884040 2266 state_mem.go:35] "Initializing new in-memory state store" May 17 00:37:33.889162 kubelet[2266]: E0517 00:37:33.889038 2266 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.19.224.18402978b68aad71 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.19.224,UID:172.31.19.224,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:172.31.19.224,},FirstTimestamp:2025-05-17 00:37:33.855108465 +0000 UTC m=+0.671927762,LastTimestamp:2025-05-17 00:37:33.855108465 +0000 UTC m=+0.671927762,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.19.224,}" May 17 00:37:33.891646 kubelet[2266]: I0517 00:37:33.891608 2266 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:37:33.890000 audit[2266]: AVC avc: denied { mac_admin } for pid=2266 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:33.890000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:37:33.890000 audit[2266]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000afa390 a1=c000933500 a2=c000afa360 a3=25 items=0 ppid=1 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.890000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:37:33.892098 kubelet[2266]: I0517 00:37:33.891703 2266 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:37:33.892098 kubelet[2266]: I0517 00:37:33.891836 2266 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:37:33.892098 kubelet[2266]: I0517 00:37:33.891849 2266 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:37:33.893876 kubelet[2266]: I0517 00:37:33.893850 2266 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:37:33.895996 kubelet[2266]: E0517 00:37:33.895911 2266 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.19.224\" not found" May 17 00:37:33.899120 kubelet[2266]: E0517 00:37:33.899030 2266 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{172.31.19.224.18402978b7d633fd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:172.31.19.224,UID:172.31.19.224,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 172.31.19.224 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:172.31.19.224,},FirstTimestamp:2025-05-17 00:37:33.876835325 +0000 UTC m=+0.693654587,LastTimestamp:2025-05-17 00:37:33.876835325 +0000 UTC m=+0.693654587,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:172.31.19.224,}" May 17 00:37:33.946000 audit[2284]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:33.946000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec6cf10c0 a2=0 a3=7ffec6cf10ac items=0 ppid=2266 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:37:33.959000 audit[2287]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:33.959000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffed6f9d20 a2=0 a3=7fffed6f9d0c items=0 ppid=2266 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:37:33.993824 kubelet[2266]: I0517 00:37:33.993785 2266 kubelet_node_status.go:72] "Attempting to register node" node="172.31.19.224" May 17 00:37:33.962000 audit[2289]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:33.962000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe69b76940 a2=0 a3=7ffe69b7692c items=0 ppid=2266 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:33.998000 audit[2294]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:33.998000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd0432f00 a2=0 a3=7fffd0432eec items=0 ppid=2266 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:33.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:34.006372 kubelet[2266]: I0517 00:37:34.006340 2266 kubelet_node_status.go:75] "Successfully registered node" node="172.31.19.224" May 17 00:37:34.006534 kubelet[2266]: E0517 00:37:34.006431 2266 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"172.31.19.224\": node \"172.31.19.224\" not found" May 17 00:37:34.023978 kubelet[2266]: E0517 00:37:34.023941 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.107000 audit[2299]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:34.107000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd5464a410 a2=0 a3=7ffd5464a3fc items=0 ppid=2266 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:37:34.109828 kubelet[2266]: I0517 00:37:34.109786 2266 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:37:34.110000 audit[2300]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:34.110000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0d1a2a40 a2=0 a3=7ffc0d1a2a2c items=0 ppid=2266 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.110000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:37:34.110000 audit[2301]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:34.110000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2681f2d0 a2=0 a3=7ffe2681f2bc items=0 ppid=2266 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:37:34.112252 kubelet[2266]: I0517 00:37:34.112225 2266 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:37:34.112399 kubelet[2266]: I0517 00:37:34.112387 2266 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:37:34.112522 kubelet[2266]: I0517 00:37:34.112511 2266 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:37:34.112756 kubelet[2266]: E0517 00:37:34.112736 2266 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" May 17 00:37:34.112000 audit[2302]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:34.112000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffee551b0f0 a2=0 a3=7ffee551b0dc items=0 ppid=2266 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:37:34.114000 audit[2303]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:34.114000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff46285f60 a2=0 a3=7fff46285f4c items=0 ppid=2266 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:37:34.115000 audit[2304]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:34.115000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca5e9d600 a2=0 a3=7ffca5e9d5ec items=0 ppid=2266 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.116000 audit[2305]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:34.116000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffebf508cc0 a2=0 a3=7ffebf508cac items=0 ppid=2266 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.116000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:37:34.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:37:34.117000 audit[2306]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:34.117000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd03d8f080 a2=0 a3=7ffd03d8f06c items=0 ppid=2266 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:34.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:37:34.124291 kubelet[2266]: E0517 00:37:34.124243 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.225384 kubelet[2266]: E0517 00:37:34.225097 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.231036 sudo[2128]: pam_unix(sudo:session): session closed for user root May 17 00:37:34.230000 audit[2128]: USER_END pid=2128 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:34.230000 audit[2128]: CRED_DISP pid=2128 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:37:34.253393 sshd[2124]: pam_unix(sshd:session): session closed for user core May 17 00:37:34.253000 audit[2124]: USER_END pid=2124 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:34.253000 audit[2124]: CRED_DISP pid=2124 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 17 00:37:34.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.224:22-139.178.68.195:53770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:34.256261 systemd[1]: sshd@6-172.31.19.224:22-139.178.68.195:53770.service: Deactivated successfully. May 17 00:37:34.257092 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:37:34.259212 systemd-logind[1825]: Session 7 logged out. Waiting for processes to exit. May 17 00:37:34.260528 systemd-logind[1825]: Removed session 7. May 17 00:37:34.325503 kubelet[2266]: E0517 00:37:34.325412 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.426218 kubelet[2266]: E0517 00:37:34.426180 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.527115 kubelet[2266]: E0517 00:37:34.526996 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.627825 kubelet[2266]: E0517 00:37:34.627748 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.697878 kubelet[2266]: I0517 00:37:34.697649 2266 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" May 17 00:37:34.698319 kubelet[2266]: W0517 00:37:34.698078 2266 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received May 17 00:37:34.728946 kubelet[2266]: E0517 00:37:34.728880 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.809048 kubelet[2266]: E0517 00:37:34.808810 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:34.829643 kubelet[2266]: E0517 00:37:34.829602 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:34.930839 kubelet[2266]: E0517 00:37:34.930673 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:35.031626 kubelet[2266]: E0517 00:37:35.031574 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:35.132187 kubelet[2266]: E0517 00:37:35.132063 2266 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"172.31.19.224\" not found" May 17 00:37:35.232733 kubelet[2266]: I0517 00:37:35.232701 2266 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" May 17 00:37:35.233127 env[1840]: time="2025-05-17T00:37:35.233058468Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:37:35.233704 kubelet[2266]: I0517 00:37:35.233376 2266 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" May 17 00:37:35.809775 kubelet[2266]: E0517 00:37:35.809735 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:35.810219 kubelet[2266]: I0517 00:37:35.809796 2266 apiserver.go:52] "Watching apiserver" May 17 00:37:35.818239 kubelet[2266]: E0517 00:37:35.818193 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:35.836732 kubelet[2266]: I0517 00:37:35.836711 2266 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:37:35.849759 kubelet[2266]: I0517 00:37:35.849719 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-cni-log-dir\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.849759 kubelet[2266]: I0517 00:37:35.849757 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/34cbb532-045c-4b98-a1e9-d192f21a4280-tigera-ca-bundle\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.849974 kubelet[2266]: I0517 00:37:35.849779 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-var-lib-calico\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.849974 kubelet[2266]: I0517 00:37:35.849794 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ecaa0d1c-6921-4590-ad9d-12459ee26d1d-socket-dir\") pod \"csi-node-driver-qfstf\" (UID: \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\") " pod="calico-system/csi-node-driver-qfstf" May 17 00:37:35.849974 kubelet[2266]: I0517 00:37:35.849809 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ecaa0d1c-6921-4590-ad9d-12459ee26d1d-varrun\") pod \"csi-node-driver-qfstf\" (UID: \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\") " pod="calico-system/csi-node-driver-qfstf" May 17 00:37:35.849974 kubelet[2266]: I0517 00:37:35.849823 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c23a14be-ee7f-4e38-b6a4-e1cb7987f16d-kube-proxy\") pod \"kube-proxy-7vr47\" (UID: \"c23a14be-ee7f-4e38-b6a4-e1cb7987f16d\") " pod="kube-system/kube-proxy-7vr47" May 17 00:37:35.849974 kubelet[2266]: I0517 00:37:35.849836 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c23a14be-ee7f-4e38-b6a4-e1cb7987f16d-xtables-lock\") pod \"kube-proxy-7vr47\" (UID: \"c23a14be-ee7f-4e38-b6a4-e1cb7987f16d\") " pod="kube-system/kube-proxy-7vr47" May 17 00:37:35.850102 kubelet[2266]: I0517 00:37:35.849849 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c23a14be-ee7f-4e38-b6a4-e1cb7987f16d-lib-modules\") pod \"kube-proxy-7vr47\" (UID: \"c23a14be-ee7f-4e38-b6a4-e1cb7987f16d\") " pod="kube-system/kube-proxy-7vr47" May 17 00:37:35.850102 kubelet[2266]: I0517 00:37:35.849878 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-lib-modules\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850102 kubelet[2266]: I0517 00:37:35.849892 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/34cbb532-045c-4b98-a1e9-d192f21a4280-node-certs\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850102 kubelet[2266]: I0517 00:37:35.849906 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-var-run-calico\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850102 kubelet[2266]: I0517 00:37:35.849934 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-cni-net-dir\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850242 kubelet[2266]: I0517 00:37:35.849949 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-flexvol-driver-host\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850242 kubelet[2266]: I0517 00:37:35.849963 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-xtables-lock\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850242 kubelet[2266]: I0517 00:37:35.849978 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-policysync\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850242 kubelet[2266]: I0517 00:37:35.849993 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5tl7b\" (UniqueName: \"kubernetes.io/projected/34cbb532-045c-4b98-a1e9-d192f21a4280-kube-api-access-5tl7b\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.850242 kubelet[2266]: I0517 00:37:35.850008 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ecaa0d1c-6921-4590-ad9d-12459ee26d1d-kubelet-dir\") pod \"csi-node-driver-qfstf\" (UID: \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\") " pod="calico-system/csi-node-driver-qfstf" May 17 00:37:35.850368 kubelet[2266]: I0517 00:37:35.850024 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ecaa0d1c-6921-4590-ad9d-12459ee26d1d-registration-dir\") pod \"csi-node-driver-qfstf\" (UID: \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\") " pod="calico-system/csi-node-driver-qfstf" May 17 00:37:35.850368 kubelet[2266]: I0517 00:37:35.850041 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t4pcm\" (UniqueName: \"kubernetes.io/projected/ecaa0d1c-6921-4590-ad9d-12459ee26d1d-kube-api-access-t4pcm\") pod \"csi-node-driver-qfstf\" (UID: \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\") " pod="calico-system/csi-node-driver-qfstf" May 17 00:37:35.850368 kubelet[2266]: I0517 00:37:35.850057 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-blgfp\" (UniqueName: \"kubernetes.io/projected/c23a14be-ee7f-4e38-b6a4-e1cb7987f16d-kube-api-access-blgfp\") pod \"kube-proxy-7vr47\" (UID: \"c23a14be-ee7f-4e38-b6a4-e1cb7987f16d\") " pod="kube-system/kube-proxy-7vr47" May 17 00:37:35.850368 kubelet[2266]: I0517 00:37:35.850070 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/34cbb532-045c-4b98-a1e9-d192f21a4280-cni-bin-dir\") pod \"calico-node-qzzmb\" (UID: \"34cbb532-045c-4b98-a1e9-d192f21a4280\") " pod="calico-system/calico-node-qzzmb" May 17 00:37:35.952520 kubelet[2266]: I0517 00:37:35.952486 2266 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:37:35.960216 kubelet[2266]: E0517 00:37:35.958891 2266 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:35.960216 kubelet[2266]: W0517 00:37:35.958910 2266 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:35.960216 kubelet[2266]: E0517 00:37:35.958942 2266 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:35.975209 kubelet[2266]: E0517 00:37:35.974809 2266 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:35.975209 kubelet[2266]: W0517 00:37:35.974829 2266 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:35.975209 kubelet[2266]: E0517 00:37:35.974849 2266 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:35.976208 kubelet[2266]: E0517 00:37:35.976188 2266 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:35.976334 kubelet[2266]: W0517 00:37:35.976320 2266 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:35.976396 kubelet[2266]: E0517 00:37:35.976384 2266 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:35.982236 kubelet[2266]: E0517 00:37:35.982130 2266 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:37:35.982236 kubelet[2266]: W0517 00:37:35.982148 2266 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:37:35.982236 kubelet[2266]: E0517 00:37:35.982168 2266 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:37:36.127118 env[1840]: time="2025-05-17T00:37:36.126954998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7vr47,Uid:c23a14be-ee7f-4e38-b6a4-e1cb7987f16d,Namespace:kube-system,Attempt:0,}" May 17 00:37:36.127687 env[1840]: time="2025-05-17T00:37:36.127596582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qzzmb,Uid:34cbb532-045c-4b98-a1e9-d192f21a4280,Namespace:calico-system,Attempt:0,}" May 17 00:37:36.662045 env[1840]: time="2025-05-17T00:37:36.661995219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.667576 env[1840]: time="2025-05-17T00:37:36.667522582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.668880 env[1840]: time="2025-05-17T00:37:36.668844643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.671911 env[1840]: time="2025-05-17T00:37:36.671862114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.672840 env[1840]: time="2025-05-17T00:37:36.672801353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.674052 env[1840]: time="2025-05-17T00:37:36.674016217Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.676056 env[1840]: time="2025-05-17T00:37:36.676020317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.681510 env[1840]: time="2025-05-17T00:37:36.681448972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:36.708988 env[1840]: time="2025-05-17T00:37:36.701327411Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:36.708988 env[1840]: time="2025-05-17T00:37:36.701377959Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:36.708988 env[1840]: time="2025-05-17T00:37:36.701403920Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:36.708988 env[1840]: time="2025-05-17T00:37:36.701567255Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15 pid=2327 runtime=io.containerd.runc.v2 May 17 00:37:36.710521 env[1840]: time="2025-05-17T00:37:36.710291857Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:37:36.710521 env[1840]: time="2025-05-17T00:37:36.710339504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:37:36.710521 env[1840]: time="2025-05-17T00:37:36.710357060Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:37:36.711729 env[1840]: time="2025-05-17T00:37:36.710531124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1eb3b465062a05c1f2995ebe84b655b67796d04e72d6b5eac42fec1f5dbf67a1 pid=2341 runtime=io.containerd.runc.v2 May 17 00:37:36.783769 env[1840]: time="2025-05-17T00:37:36.782687085Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qzzmb,Uid:34cbb532-045c-4b98-a1e9-d192f21a4280,Namespace:calico-system,Attempt:0,} returns sandbox id \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\"" May 17 00:37:36.785590 env[1840]: time="2025-05-17T00:37:36.785547369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:37:36.787162 env[1840]: time="2025-05-17T00:37:36.787105923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7vr47,Uid:c23a14be-ee7f-4e38-b6a4-e1cb7987f16d,Namespace:kube-system,Attempt:0,} returns sandbox id \"1eb3b465062a05c1f2995ebe84b655b67796d04e72d6b5eac42fec1f5dbf67a1\"" May 17 00:37:36.810773 kubelet[2266]: E0517 00:37:36.810708 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:36.962799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount439558290.mount: Deactivated successfully. May 17 00:37:37.114040 kubelet[2266]: E0517 00:37:37.113971 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:37.811205 kubelet[2266]: E0517 00:37:37.811113 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:37.845178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2533150486.mount: Deactivated successfully. May 17 00:37:37.972124 env[1840]: time="2025-05-17T00:37:37.972059869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.975076 env[1840]: time="2025-05-17T00:37:37.975029813Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.977120 env[1840]: time="2025-05-17T00:37:37.977074360Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.979157 env[1840]: time="2025-05-17T00:37:37.979101856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:37.979734 env[1840]: time="2025-05-17T00:37:37.979705499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:37:37.982109 env[1840]: time="2025-05-17T00:37:37.981772765Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:37:37.982483 env[1840]: time="2025-05-17T00:37:37.982430611Z" level=info msg="CreateContainer within sandbox \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:37:37.998650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3474059287.mount: Deactivated successfully. May 17 00:37:38.009895 env[1840]: time="2025-05-17T00:37:38.009838239Z" level=info msg="CreateContainer within sandbox \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629\"" May 17 00:37:38.011260 env[1840]: time="2025-05-17T00:37:38.011202219Z" level=info msg="StartContainer for \"bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629\"" May 17 00:37:38.105007 env[1840]: time="2025-05-17T00:37:38.104341964Z" level=info msg="StartContainer for \"bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629\" returns successfully" May 17 00:37:38.192150 env[1840]: time="2025-05-17T00:37:38.192100101Z" level=info msg="shim disconnected" id=bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629 May 17 00:37:38.192150 env[1840]: time="2025-05-17T00:37:38.192151214Z" level=warning msg="cleaning up after shim disconnected" id=bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629 namespace=k8s.io May 17 00:37:38.192379 env[1840]: time="2025-05-17T00:37:38.192162299Z" level=info msg="cleaning up dead shim" May 17 00:37:38.202421 env[1840]: time="2025-05-17T00:37:38.202376954Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2453 runtime=io.containerd.runc.v2\n" May 17 00:37:38.812036 kubelet[2266]: E0517 00:37:38.811974 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:39.001544 systemd[1]: run-containerd-runc-k8s.io-bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629-runc.tvUGa6.mount: Deactivated successfully. May 17 00:37:39.001744 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bd4fa2ab3f61cd7e3df7f5eafae148c60f2d75e61304f5054ca333a451cca629-rootfs.mount: Deactivated successfully. May 17 00:37:39.113755 kubelet[2266]: E0517 00:37:39.113329 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:39.160978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4048249983.mount: Deactivated successfully. May 17 00:37:39.812786 kubelet[2266]: E0517 00:37:39.812702 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:39.833467 env[1840]: time="2025-05-17T00:37:39.833401979Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:39.837461 env[1840]: time="2025-05-17T00:37:39.837401927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:39.839723 env[1840]: time="2025-05-17T00:37:39.839673152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:39.842135 env[1840]: time="2025-05-17T00:37:39.842074869Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:39.842915 env[1840]: time="2025-05-17T00:37:39.842847959Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:37:39.844287 env[1840]: time="2025-05-17T00:37:39.844243374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:37:39.847387 env[1840]: time="2025-05-17T00:37:39.847343727Z" level=info msg="CreateContainer within sandbox \"1eb3b465062a05c1f2995ebe84b655b67796d04e72d6b5eac42fec1f5dbf67a1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:37:39.865092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3181728077.mount: Deactivated successfully. May 17 00:37:39.877650 env[1840]: time="2025-05-17T00:37:39.877603343Z" level=info msg="CreateContainer within sandbox \"1eb3b465062a05c1f2995ebe84b655b67796d04e72d6b5eac42fec1f5dbf67a1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e02870b3e066b00d17b178283d3cb3057f4cb9b506837ca7e783697dac23363a\"" May 17 00:37:39.878526 env[1840]: time="2025-05-17T00:37:39.878482478Z" level=info msg="StartContainer for \"e02870b3e066b00d17b178283d3cb3057f4cb9b506837ca7e783697dac23363a\"" May 17 00:37:39.936468 env[1840]: time="2025-05-17T00:37:39.936408832Z" level=info msg="StartContainer for \"e02870b3e066b00d17b178283d3cb3057f4cb9b506837ca7e783697dac23363a\" returns successfully" May 17 00:37:39.996612 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1688582807.mount: Deactivated successfully. May 17 00:37:40.090821 kernel: kauditd_printk_skb: 70 callbacks suppressed May 17 00:37:40.090993 kernel: audit: type=1325 audit(1747442260.084:196): table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.091046 kernel: audit: type=1325 audit(1747442260.084:197): table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2534 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.084000 audit[2533]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.084000 audit[2534]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2534 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.084000 audit[2534]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfa0e2d10 a2=0 a3=7ffdfa0e2cfc items=0 ppid=2484 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:40.110473 kernel: audit: type=1300 audit(1747442260.084:197): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfa0e2d10 a2=0 a3=7ffdfa0e2cfc items=0 ppid=2484 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.110599 kernel: audit: type=1327 audit(1747442260.084:197): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:40.111142 kernel: audit: type=1325 audit(1747442260.093:198): table=nat:16 family=2 entries=1 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.093000 audit[2535]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.093000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff68bd15f0 a2=0 a3=7fff68bd15dc items=0 ppid=2484 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.125080 kernel: audit: type=1300 audit(1747442260.093:198): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff68bd15f0 a2=0 a3=7fff68bd15dc items=0 ppid=2484 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:40.130059 kernel: audit: type=1327 audit(1747442260.093:198): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:40.130152 kernel: audit: type=1300 audit(1747442260.084:196): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5e56fd70 a2=0 a3=7fff5e56fd5c items=0 ppid=2484 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.084000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5e56fd70 a2=0 a3=7fff5e56fd5c items=0 ppid=2484 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.139242 kernel: audit: type=1327 audit(1747442260.084:196): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:40.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:37:40.097000 audit[2536]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.147241 kernel: audit: type=1325 audit(1747442260.097:199): table=filter:17 family=2 entries=1 op=nft_register_chain pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.097000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed893a2a0 a2=0 a3=7ffed893a28c items=0 ppid=2484 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:40.103000 audit[2538]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.103000 audit[2538]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd210bd60 a2=0 a3=7ffdd210bd4c items=0 ppid=2484 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:37:40.105000 audit[2539]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2539 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.105000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe68753850 a2=0 a3=7ffe6875383c items=0 ppid=2484 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.105000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:37:40.184000 audit[2540]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.184000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff7e081550 a2=0 a3=7fff7e08153c items=0 ppid=2484 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:40.187000 audit[2542]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.187000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdf2eace60 a2=0 a3=7ffdf2eace4c items=0 ppid=2484 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:37:40.192000 audit[2545]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2545 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.192000 audit[2545]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc21eef800 a2=0 a3=7ffc21eef7ec items=0 ppid=2484 pid=2545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.192000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:37:40.193000 audit[2546]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.193000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd32e33690 a2=0 a3=7ffd32e3367c items=0 ppid=2484 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:37:40.196000 audit[2548]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.196000 audit[2548]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9aea00f0 a2=0 a3=7ffe9aea00dc items=0 ppid=2484 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:37:40.198000 audit[2549]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.198000 audit[2549]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9346eca0 a2=0 a3=7ffd9346ec8c items=0 ppid=2484 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:37:40.201000 audit[2551]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2551 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.201000 audit[2551]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffddba4b110 a2=0 a3=7ffddba4b0fc items=0 ppid=2484 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:37:40.205000 audit[2554]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.205000 audit[2554]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe7c65e840 a2=0 a3=7ffe7c65e82c items=0 ppid=2484 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:37:40.206000 audit[2555]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2555 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.206000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd72941c20 a2=0 a3=7ffd72941c0c items=0 ppid=2484 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:37:40.209000 audit[2557]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2557 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.209000 audit[2557]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb75b2580 a2=0 a3=7ffdb75b256c items=0 ppid=2484 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:37:40.210000 audit[2558]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2558 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.210000 audit[2558]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc762edc90 a2=0 a3=7ffc762edc7c items=0 ppid=2484 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:37:40.213000 audit[2560]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2560 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.213000 audit[2560]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff4fd8ee30 a2=0 a3=7fff4fd8ee1c items=0 ppid=2484 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:40.217000 audit[2563]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2563 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.217000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1c789460 a2=0 a3=7fff1c78944c items=0 ppid=2484 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:40.221000 audit[2566]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.221000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe53a1f7f0 a2=0 a3=7ffe53a1f7dc items=0 ppid=2484 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:37:40.222000 audit[2567]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.222000 audit[2567]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcb88c43c0 a2=0 a3=7ffcb88c43ac items=0 ppid=2484 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:37:40.225000 audit[2569]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2569 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.225000 audit[2569]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc8826abd0 a2=0 a3=7ffc8826abbc items=0 ppid=2484 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:40.252000 audit[2573]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.252000 audit[2573]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3da47ff0 a2=0 a3=7ffd3da47fdc items=0 ppid=2484 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.252000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:40.253000 audit[2574]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2574 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.253000 audit[2574]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe251e1e60 a2=0 a3=7ffe251e1e4c items=0 ppid=2484 pid=2574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:37:40.257000 audit[2576]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:37:40.257000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdb4711fa0 a2=0 a3=7ffdb4711f8c items=0 ppid=2484 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:37:40.315000 audit[2582]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=2582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:40.315000 audit[2582]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe595d4f10 a2=0 a3=7ffe595d4efc items=0 ppid=2484 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:40.343000 audit[2582]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=2582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:37:40.343000 audit[2582]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7ffe595d4f10 a2=0 a3=7ffe595d4efc items=0 ppid=2484 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:40.358000 audit[2592]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.358000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdf72e5550 a2=0 a3=7ffdf72e553c items=0 ppid=2484 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:37:40.362000 audit[2594]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2594 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.362000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6a6f0c80 a2=0 a3=7ffd6a6f0c6c items=0 ppid=2484 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:37:40.366000 audit[2597]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2597 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.366000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc6c4a17c0 a2=0 a3=7ffc6c4a17ac items=0 ppid=2484 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:37:40.368000 audit[2598]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2598 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.368000 audit[2598]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc98b2c640 a2=0 a3=7ffc98b2c62c items=0 ppid=2484 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:37:40.371000 audit[2600]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2600 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.371000 audit[2600]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2c5fa830 a2=0 a3=7ffc2c5fa81c items=0 ppid=2484 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:37:40.372000 audit[2601]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2601 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.372000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdad99a7e0 a2=0 a3=7ffdad99a7cc items=0 ppid=2484 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:37:40.376000 audit[2603]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.376000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd237ead80 a2=0 a3=7ffd237ead6c items=0 ppid=2484 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:37:40.380000 audit[2606]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.380000 audit[2606]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcadcc4250 a2=0 a3=7ffcadcc423c items=0 ppid=2484 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:37:40.382000 audit[2607]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2607 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.382000 audit[2607]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1c0d76a0 a2=0 a3=7fff1c0d768c items=0 ppid=2484 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:37:40.385000 audit[2609]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2609 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.385000 audit[2609]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1d2667a0 a2=0 a3=7fff1d26678c items=0 ppid=2484 pid=2609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:37:40.386000 audit[2610]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2610 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.386000 audit[2610]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd402fc750 a2=0 a3=7ffd402fc73c items=0 ppid=2484 pid=2610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:37:40.390000 audit[2612]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.390000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4d33b670 a2=0 a3=7ffc4d33b65c items=0 ppid=2484 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:37:40.394000 audit[2615]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2615 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.394000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3094c7e0 a2=0 a3=7ffe3094c7cc items=0 ppid=2484 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:37:40.399000 audit[2618]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.399000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9f22ec70 a2=0 a3=7ffd9f22ec5c items=0 ppid=2484 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:37:40.400000 audit[2619]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2619 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.400000 audit[2619]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd93ea3570 a2=0 a3=7ffd93ea355c items=0 ppid=2484 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:37:40.403000 audit[2621]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2621 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.403000 audit[2621]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd466980f0 a2=0 a3=7ffd466980dc items=0 ppid=2484 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:40.407000 audit[2624]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.407000 audit[2624]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe4dc8d0e0 a2=0 a3=7ffe4dc8d0cc items=0 ppid=2484 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:37:40.409000 audit[2625]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.409000 audit[2625]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe32a9daa0 a2=0 a3=7ffe32a9da8c items=0 ppid=2484 pid=2625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:37:40.411000 audit[2627]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.411000 audit[2627]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffce6b6eee0 a2=0 a3=7ffce6b6eecc items=0 ppid=2484 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:37:40.424000 audit[2628]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2628 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.424000 audit[2628]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe52e0acf0 a2=0 a3=7ffe52e0acdc items=0 ppid=2484 pid=2628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:37:40.427000 audit[2630]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.427000 audit[2630]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda73a4d50 a2=0 a3=7ffda73a4d3c items=0 ppid=2484 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:40.432000 audit[2633]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:37:40.432000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4a938ca0 a2=0 a3=7fff4a938c8c items=0 ppid=2484 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:37:40.435000 audit[2635]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:37:40.435000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd7013b5f0 a2=0 a3=7ffd7013b5dc items=0 ppid=2484 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.435000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:40.436000 audit[2635]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:37:40.436000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd7013b5f0 a2=0 a3=7ffd7013b5dc items=0 ppid=2484 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:40.436000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:37:40.813042 kubelet[2266]: E0517 00:37:40.812997 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:41.114084 kubelet[2266]: E0517 00:37:41.113561 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:41.813857 kubelet[2266]: E0517 00:37:41.813784 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:42.814299 kubelet[2266]: E0517 00:37:42.814243 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:43.015587 env[1840]: time="2025-05-17T00:37:43.015531781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.018491 env[1840]: time="2025-05-17T00:37:43.018443139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.021760 env[1840]: time="2025-05-17T00:37:43.021712828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.023657 env[1840]: time="2025-05-17T00:37:43.023618655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:43.024238 env[1840]: time="2025-05-17T00:37:43.024198884Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:37:43.026528 env[1840]: time="2025-05-17T00:37:43.026491153Z" level=info msg="CreateContainer within sandbox \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:37:43.042099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount677721443.mount: Deactivated successfully. May 17 00:37:43.051145 env[1840]: time="2025-05-17T00:37:43.051074877Z" level=info msg="CreateContainer within sandbox \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"64367794f599da8b570c1142a2167b8d599336330265d36e8ab96fbf894b0670\"" May 17 00:37:43.051834 env[1840]: time="2025-05-17T00:37:43.051782028Z" level=info msg="StartContainer for \"64367794f599da8b570c1142a2167b8d599336330265d36e8ab96fbf894b0670\"" May 17 00:37:43.113943 kubelet[2266]: E0517 00:37:43.112844 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:43.143950 env[1840]: time="2025-05-17T00:37:43.142083756Z" level=info msg="StartContainer for \"64367794f599da8b570c1142a2167b8d599336330265d36e8ab96fbf894b0670\" returns successfully" May 17 00:37:43.210686 kubelet[2266]: I0517 00:37:43.210600 2266 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7vr47" podStartSLOduration=6.155057837 podStartE2EDuration="9.210577713s" podCreationTimestamp="2025-05-17 00:37:34 +0000 UTC" firstStartedPulling="2025-05-17 00:37:36.788480288 +0000 UTC m=+3.605299543" lastFinishedPulling="2025-05-17 00:37:39.84400015 +0000 UTC m=+6.660819419" observedRunningTime="2025-05-17 00:37:40.165661886 +0000 UTC m=+6.982481147" watchObservedRunningTime="2025-05-17 00:37:43.210577713 +0000 UTC m=+10.027396979" May 17 00:37:43.814937 kubelet[2266]: E0517 00:37:43.814880 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:44.396643 env[1840]: time="2025-05-17T00:37:44.396570647Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:37:44.425054 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-64367794f599da8b570c1142a2167b8d599336330265d36e8ab96fbf894b0670-rootfs.mount: Deactivated successfully. May 17 00:37:44.440686 env[1840]: time="2025-05-17T00:37:44.440618623Z" level=info msg="shim disconnected" id=64367794f599da8b570c1142a2167b8d599336330265d36e8ab96fbf894b0670 May 17 00:37:44.441022 env[1840]: time="2025-05-17T00:37:44.440692725Z" level=warning msg="cleaning up after shim disconnected" id=64367794f599da8b570c1142a2167b8d599336330265d36e8ab96fbf894b0670 namespace=k8s.io May 17 00:37:44.441022 env[1840]: time="2025-05-17T00:37:44.440708183Z" level=info msg="cleaning up dead shim" May 17 00:37:44.449731 env[1840]: time="2025-05-17T00:37:44.449677585Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:37:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2683 runtime=io.containerd.runc.v2\n" May 17 00:37:44.460315 kubelet[2266]: I0517 00:37:44.459463 2266 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:37:44.815733 kubelet[2266]: E0517 00:37:44.815685 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:45.116278 env[1840]: time="2025-05-17T00:37:45.116178636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qfstf,Uid:ecaa0d1c-6921-4590-ad9d-12459ee26d1d,Namespace:calico-system,Attempt:0,}" May 17 00:37:45.185071 env[1840]: time="2025-05-17T00:37:45.185025479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:37:45.204075 env[1840]: time="2025-05-17T00:37:45.204011047Z" level=error msg="Failed to destroy network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:45.207122 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc-shm.mount: Deactivated successfully. May 17 00:37:45.209354 env[1840]: time="2025-05-17T00:37:45.209296802Z" level=error msg="encountered an error cleaning up failed sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:45.209461 env[1840]: time="2025-05-17T00:37:45.209372710Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qfstf,Uid:ecaa0d1c-6921-4590-ad9d-12459ee26d1d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:45.209686 kubelet[2266]: E0517 00:37:45.209635 2266 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:45.209795 kubelet[2266]: E0517 00:37:45.209705 2266 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qfstf" May 17 00:37:45.209795 kubelet[2266]: E0517 00:37:45.209732 2266 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qfstf" May 17 00:37:45.209888 kubelet[2266]: E0517 00:37:45.209791 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qfstf_calico-system(ecaa0d1c-6921-4590-ad9d-12459ee26d1d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qfstf_calico-system(ecaa0d1c-6921-4590-ad9d-12459ee26d1d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:45.816527 kubelet[2266]: E0517 00:37:45.816473 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:46.186193 kubelet[2266]: I0517 00:37:46.186163 2266 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:37:46.188187 env[1840]: time="2025-05-17T00:37:46.188146203Z" level=info msg="StopPodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\"" May 17 00:37:46.223810 env[1840]: time="2025-05-17T00:37:46.223746455Z" level=error msg="StopPodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" failed" error="failed to destroy network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:46.224161 kubelet[2266]: E0517 00:37:46.224117 2266 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:37:46.224288 kubelet[2266]: E0517 00:37:46.224189 2266 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc"} May 17 00:37:46.224288 kubelet[2266]: E0517 00:37:46.224263 2266 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:46.224416 kubelet[2266]: E0517 00:37:46.224294 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ecaa0d1c-6921-4590-ad9d-12459ee26d1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qfstf" podUID="ecaa0d1c-6921-4590-ad9d-12459ee26d1d" May 17 00:37:46.816818 kubelet[2266]: E0517 00:37:46.816751 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:47.480794 amazon-ssm-agent[1812]: 2025-05-17 00:37:47 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 17 00:37:47.817636 kubelet[2266]: E0517 00:37:47.817305 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:48.818454 kubelet[2266]: E0517 00:37:48.818392 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:49.812999 kernel: kauditd_printk_skb: 143 callbacks suppressed May 17 00:37:49.813199 kernel: audit: type=1131 audit(1747442269.802:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:49.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:37:49.803573 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 17 00:37:49.818641 kubelet[2266]: E0517 00:37:49.818606 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:50.067255 kubelet[2266]: I0517 00:37:50.067138 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mwvkf\" (UniqueName: \"kubernetes.io/projected/c857e900-0ae2-419c-b145-c787e4b86ff1-kube-api-access-mwvkf\") pod \"nginx-deployment-8587fbcb89-cndx2\" (UID: \"c857e900-0ae2-419c-b145-c787e4b86ff1\") " pod="default/nginx-deployment-8587fbcb89-cndx2" May 17 00:37:50.270643 env[1840]: time="2025-05-17T00:37:50.270587590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-cndx2,Uid:c857e900-0ae2-419c-b145-c787e4b86ff1,Namespace:default,Attempt:0,}" May 17 00:37:50.572303 env[1840]: time="2025-05-17T00:37:50.564328156Z" level=error msg="Failed to destroy network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:50.572303 env[1840]: time="2025-05-17T00:37:50.564740981Z" level=error msg="encountered an error cleaning up failed sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:50.572303 env[1840]: time="2025-05-17T00:37:50.564801597Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-cndx2,Uid:c857e900-0ae2-419c-b145-c787e4b86ff1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:50.570049 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc-shm.mount: Deactivated successfully. May 17 00:37:50.572810 kubelet[2266]: E0517 00:37:50.565056 2266 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:50.572810 kubelet[2266]: E0517 00:37:50.565144 2266 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-cndx2" May 17 00:37:50.572810 kubelet[2266]: E0517 00:37:50.565174 2266 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-cndx2" May 17 00:37:50.573899 kubelet[2266]: E0517 00:37:50.565226 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-cndx2_default(c857e900-0ae2-419c-b145-c787e4b86ff1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-cndx2_default(c857e900-0ae2-419c-b145-c787e4b86ff1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-cndx2" podUID="c857e900-0ae2-419c-b145-c787e4b86ff1" May 17 00:37:50.819266 kubelet[2266]: E0517 00:37:50.819198 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:51.202754 kubelet[2266]: I0517 00:37:51.202722 2266 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:37:51.203549 env[1840]: time="2025-05-17T00:37:51.203505029Z" level=info msg="StopPodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\"" May 17 00:37:51.289518 env[1840]: time="2025-05-17T00:37:51.289456289Z" level=error msg="StopPodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" failed" error="failed to destroy network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:37:51.289991 kubelet[2266]: E0517 00:37:51.289699 2266 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:37:51.289991 kubelet[2266]: E0517 00:37:51.289754 2266 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc"} May 17 00:37:51.289991 kubelet[2266]: E0517 00:37:51.289799 2266 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c857e900-0ae2-419c-b145-c787e4b86ff1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:37:51.289991 kubelet[2266]: E0517 00:37:51.289836 2266 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c857e900-0ae2-419c-b145-c787e4b86ff1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-cndx2" podUID="c857e900-0ae2-419c-b145-c787e4b86ff1" May 17 00:37:51.678788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1987988564.mount: Deactivated successfully. May 17 00:37:51.712262 env[1840]: time="2025-05-17T00:37:51.712159564Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:51.716126 env[1840]: time="2025-05-17T00:37:51.716081960Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:51.718323 env[1840]: time="2025-05-17T00:37:51.718268077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:51.720276 env[1840]: time="2025-05-17T00:37:51.720233289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:37:51.720990 env[1840]: time="2025-05-17T00:37:51.720953517Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:37:51.740615 env[1840]: time="2025-05-17T00:37:51.740571988Z" level=info msg="CreateContainer within sandbox \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:37:51.770865 env[1840]: time="2025-05-17T00:37:51.770789279Z" level=info msg="CreateContainer within sandbox \"71ab47d54a6ce811b2dc2f1e7de86d800b1d6925347ec44da2843b73eddc3f15\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f8b4770b483b578975fe5add41d1ceda4c9ed01b517b56e3d8bc18c8ae3ea7d5\"" May 17 00:37:51.771632 env[1840]: time="2025-05-17T00:37:51.771602266Z" level=info msg="StartContainer for \"f8b4770b483b578975fe5add41d1ceda4c9ed01b517b56e3d8bc18c8ae3ea7d5\"" May 17 00:37:51.820243 kubelet[2266]: E0517 00:37:51.820202 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:51.837948 env[1840]: time="2025-05-17T00:37:51.836800801Z" level=info msg="StartContainer for \"f8b4770b483b578975fe5add41d1ceda4c9ed01b517b56e3d8bc18c8ae3ea7d5\" returns successfully" May 17 00:37:52.013640 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:37:52.013820 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:37:52.237892 kubelet[2266]: I0517 00:37:52.237834 2266 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qzzmb" podStartSLOduration=3.30042627 podStartE2EDuration="18.23781838s" podCreationTimestamp="2025-05-17 00:37:34 +0000 UTC" firstStartedPulling="2025-05-17 00:37:36.784830087 +0000 UTC m=+3.601649340" lastFinishedPulling="2025-05-17 00:37:51.722222201 +0000 UTC m=+18.539041450" observedRunningTime="2025-05-17 00:37:52.237661293 +0000 UTC m=+19.054480558" watchObservedRunningTime="2025-05-17 00:37:52.23781838 +0000 UTC m=+19.054637626" May 17 00:37:52.820346 kubelet[2266]: E0517 00:37:52.820298 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:53.381000 audit[2898]: AVC avc: denied { write } for pid=2898 comm="tee" name="fd" dev="proc" ino=19665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.394952 kernel: audit: type=1400 audit(1747442273.381:248): avc: denied { write } for pid=2898 comm="tee" name="fd" dev="proc" ino=19665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.381000 audit[2898]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe034fd7e2 a2=241 a3=1b6 items=1 ppid=2876 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.418953 kernel: audit: type=1300 audit(1747442273.381:248): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe034fd7e2 a2=241 a3=1b6 items=1 ppid=2876 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.416000 audit[2908]: AVC avc: denied { write } for pid=2908 comm="tee" name="fd" dev="proc" ino=20603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.434012 kernel: audit: type=1400 audit(1747442273.416:249): avc: denied { write } for pid=2908 comm="tee" name="fd" dev="proc" ino=20603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.416000 audit[2908]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1f0447d2 a2=241 a3=1b6 items=1 ppid=2867 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.453971 kernel: audit: type=1300 audit(1747442273.416:249): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1f0447d2 a2=241 a3=1b6 items=1 ppid=2867 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.416000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:37:53.463954 kernel: audit: type=1307 audit(1747442273.416:249): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:37:53.416000 audit: PATH item=0 name="/dev/fd/63" inode=20594 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.477949 kernel: audit: type=1302 audit(1747442273.416:249): item=0 name="/dev/fd/63" inode=20594 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.416000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.381000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:37:53.493353 kernel: audit: type=1327 audit(1747442273.416:249): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.493511 kernel: audit: type=1307 audit(1747442273.381:248): cwd="/etc/service/enabled/bird6/log" May 17 00:37:53.381000 audit: PATH item=0 name="/dev/fd/63" inode=20587 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.511200 kernel: audit: type=1302 audit(1747442273.381:248): item=0 name="/dev/fd/63" inode=20587 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.433000 audit[2915]: AVC avc: denied { write } for pid=2915 comm="tee" name="fd" dev="proc" ino=20610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.433000 audit[2915]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd4d757e2 a2=241 a3=1b6 items=1 ppid=2871 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.433000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:37:53.433000 audit: PATH item=0 name="/dev/fd/63" inode=20597 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.435000 audit[2917]: AVC avc: denied { write } for pid=2917 comm="tee" name="fd" dev="proc" ino=20614 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.435000 audit[2917]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8d4567e2 a2=241 a3=1b6 items=1 ppid=2868 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.435000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:37:53.435000 audit: PATH item=0 name="/dev/fd/63" inode=20600 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.436000 audit[2911]: AVC avc: denied { write } for pid=2911 comm="tee" name="fd" dev="proc" ino=20618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.436000 audit[2911]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9a8827e4 a2=241 a3=1b6 items=1 ppid=2861 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.436000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:37:53.436000 audit: PATH item=0 name="/dev/fd/63" inode=19666 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.436000 audit[2904]: AVC avc: denied { write } for pid=2904 comm="tee" name="fd" dev="proc" ino=20622 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.436000 audit[2904]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea5b1e7e3 a2=241 a3=1b6 items=1 ppid=2863 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.436000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:37:53.436000 audit: PATH item=0 name="/dev/fd/63" inode=20591 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.436000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.439000 audit[2913]: AVC avc: denied { write } for pid=2913 comm="tee" name="fd" dev="proc" ino=20624 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:37:53.439000 audit[2913]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd802c37d3 a2=241 a3=1b6 items=1 ppid=2872 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.439000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:37:53.439000 audit: PATH item=0 name="/dev/fd/63" inode=19668 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:37:53.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit: BPF prog-id=10 op=LOAD May 17 00:37:53.779000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9d3e2960 a2=98 a3=3 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.779000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.779000 audit: BPF prog-id=10 op=UNLOAD May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.779000 audit: BPF prog-id=11 op=LOAD May 17 00:37:53.779000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9d3e2750 a2=94 a3=54428f items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.779000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.780000 audit: BPF prog-id=11 op=UNLOAD May 17 00:37:53.780000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.780000 audit: BPF prog-id=12 op=LOAD May 17 00:37:53.780000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9d3e2780 a2=94 a3=2 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.780000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.780000 audit: BPF prog-id=12 op=UNLOAD May 17 00:37:53.809037 kubelet[2266]: E0517 00:37:53.808970 2266 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:53.820746 kubelet[2266]: E0517 00:37:53.820688 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:53.923000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit: BPF prog-id=13 op=LOAD May 17 00:37:53.923000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff9d3e2640 a2=94 a3=1 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.923000 audit: BPF prog-id=13 op=UNLOAD May 17 00:37:53.923000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.923000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff9d3e2710 a2=50 a3=7fff9d3e27f0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.923000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.944000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.944000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9d3e2650 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9d3e2680 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9d3e2590 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9d3e26a0 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9d3e2680 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9d3e2670 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9d3e26a0 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9d3e2680 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9d3e26a0 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9d3e2670 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff9d3e26e0 a2=28 a3=0 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff9d3e2490 a2=50 a3=1 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit: BPF prog-id=14 op=LOAD May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9d3e2490 a2=94 a3=5 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit: BPF prog-id=14 op=UNLOAD May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff9d3e2540 a2=50 a3=1 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff9d3e2660 a2=4 a3=38 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.945000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:53.945000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9d3e26b0 a2=94 a3=6 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:53.946000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9d3e1e60 a2=94 a3=88 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.946000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.946000 audit[2971]: AVC avc: denied { confidentiality } for pid=2971 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:53.946000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff9d3e1e60 a2=94 a3=88 items=0 ppid=2870 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.946000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit: BPF prog-id=15 op=LOAD May 17 00:37:53.959000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffece0bb830 a2=98 a3=1999999999999999 items=0 ppid=2870 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.959000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:53.959000 audit: BPF prog-id=15 op=UNLOAD May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit: BPF prog-id=16 op=LOAD May 17 00:37:53.959000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffece0bb710 a2=94 a3=ffff items=0 ppid=2870 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.959000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:53.959000 audit: BPF prog-id=16 op=UNLOAD May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { perfmon } for pid=2974 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit[2974]: AVC avc: denied { bpf } for pid=2974 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:53.959000 audit: BPF prog-id=17 op=LOAD May 17 00:37:53.959000 audit[2974]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffece0bb750 a2=94 a3=7ffece0bb930 items=0 ppid=2870 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:53.959000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:37:53.959000 audit: BPF prog-id=17 op=UNLOAD May 17 00:37:54.025446 systemd-networkd[1517]: vxlan.calico: Link UP May 17 00:37:54.025455 systemd-networkd[1517]: vxlan.calico: Gained carrier May 17 00:37:54.029208 (udev-worker)[2829]: Network interface NamePolicy= disabled on kernel command line. May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit: BPF prog-id=18 op=LOAD May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd2004f50 a2=98 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit: BPF prog-id=18 op=UNLOAD May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit: BPF prog-id=19 op=LOAD May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd2004d60 a2=94 a3=54428f items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit: BPF prog-id=19 op=UNLOAD May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit: BPF prog-id=20 op=LOAD May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd2004d90 a2=94 a3=2 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit: BPF prog-id=20 op=UNLOAD May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd2004c60 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2004c90 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2004ba0 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd2004cb0 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.063000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.063000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd2004c90 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.063000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd2004c80 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd2004cb0 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2004c90 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2004cb0 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2004c80 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd2004cf0 a2=28 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.064000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd2004b60 a2=94 a3=0 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.064000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.066000 audit: BPF prog-id=21 op=UNLOAD May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffd2004b50 a2=50 a3=2800 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.067000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffd2004b50 a2=50 a3=2800 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.067000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit: BPF prog-id=22 op=LOAD May 17 00:37:54.067000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd2004370 a2=94 a3=2 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.067000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.067000 audit: BPF prog-id=22 op=UNLOAD May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.067000 audit: BPF prog-id=23 op=LOAD May 17 00:37:54.067000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd2004470 a2=94 a3=30 items=0 ppid=2870 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.067000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit: BPF prog-id=24 op=LOAD May 17 00:37:54.071000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff45124690 a2=98 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.071000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.071000 audit: BPF prog-id=24 op=UNLOAD May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit: BPF prog-id=25 op=LOAD May 17 00:37:54.071000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff45124480 a2=94 a3=54428f items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.071000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.071000 audit: BPF prog-id=25 op=UNLOAD May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.071000 audit: BPF prog-id=26 op=LOAD May 17 00:37:54.071000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff451244b0 a2=94 a3=2 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.071000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.071000 audit: BPF prog-id=26 op=UNLOAD May 17 00:37:54.065655 (udev-worker)[2830]: Network interface NamePolicy= disabled on kernel command line. May 17 00:37:54.079875 (udev-worker)[2999]: Network interface NamePolicy= disabled on kernel command line. May 17 00:37:54.206000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit: BPF prog-id=27 op=LOAD May 17 00:37:54.206000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff45124370 a2=94 a3=1 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.206000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.206000 audit: BPF prog-id=27 op=UNLOAD May 17 00:37:54.206000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.206000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff45124440 a2=50 a3=7fff45124520 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.206000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff45124380 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff451243b0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff451242c0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff451243d0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff451243b0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff451243a0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff451243d0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff451243b0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff451243d0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff451243a0 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.218000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.218000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff45124410 a2=28 a3=0 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.218000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff451241c0 a2=50 a3=1 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit: BPF prog-id=28 op=LOAD May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff451241c0 a2=94 a3=5 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit: BPF prog-id=28 op=UNLOAD May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff45124270 a2=50 a3=1 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff45124390 a2=4 a3=38 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { confidentiality } for pid=3003 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff451243e0 a2=94 a3=6 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { confidentiality } for pid=3003 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff45123b90 a2=94 a3=88 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { perfmon } for pid=3003 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.219000 audit[3003]: AVC avc: denied { confidentiality } for pid=3003 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:37:54.219000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff45123b90 a2=94 a3=88 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.220000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.220000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff451255c0 a2=10 a3=f8f00800 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.220000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.220000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff45125460 a2=10 a3=3 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.220000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.220000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff45125400 a2=10 a3=3 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.220000 audit[3003]: AVC avc: denied { bpf } for pid=3003 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:37:54.220000 audit[3003]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff45125400 a2=10 a3=7 items=0 ppid=2870 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:37:54.227000 audit: BPF prog-id=23 op=UNLOAD May 17 00:37:54.317000 audit[3028]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:54.317000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc666af100 a2=0 a3=7ffc666af0ec items=0 ppid=2870 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.317000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:54.331000 audit[3027]: NETFILTER_CFG table=nat:66 family=2 entries=15 op=nft_register_chain pid=3027 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:54.331000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe4e60fc40 a2=0 a3=7ffe4e60fc2c items=0 ppid=2870 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.331000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:54.332000 audit[3029]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:54.332000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc3acca5d0 a2=0 a3=7ffc3acca5bc items=0 ppid=2870 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:54.332000 audit[3024]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=3024 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:37:54.332000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdec4f85e0 a2=0 a3=7ffdec4f85cc items=0 ppid=2870 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:37:54.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:37:54.821499 kubelet[2266]: E0517 00:37:54.821450 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:55.274153 systemd-networkd[1517]: vxlan.calico: Gained IPv6LL May 17 00:37:55.822182 kubelet[2266]: E0517 00:37:55.822113 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:56.823099 kubelet[2266]: E0517 00:37:56.823056 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:57.823515 kubelet[2266]: E0517 00:37:57.823457 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:58.824195 kubelet[2266]: E0517 00:37:58.824118 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:37:59.825185 kubelet[2266]: E0517 00:37:59.825133 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:00.115389 env[1840]: time="2025-05-17T00:38:00.115018384Z" level=info msg="StopPodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\"" May 17 00:38:00.826104 kubelet[2266]: E0517 00:38:00.826064 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:00.494 [INFO][3059] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:00.502 [INFO][3059] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" iface="eth0" netns="/var/run/netns/cni-bf3b7926-8e54-733b-8ebc-7ca4c6d461ce" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:00.503 [INFO][3059] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" iface="eth0" netns="/var/run/netns/cni-bf3b7926-8e54-733b-8ebc-7ca4c6d461ce" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:00.515 [INFO][3059] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" iface="eth0" netns="/var/run/netns/cni-bf3b7926-8e54-733b-8ebc-7ca4c6d461ce" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:00.515 [INFO][3059] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:00.515 [INFO][3059] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.066 [INFO][3067] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.067 [INFO][3067] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.067 [INFO][3067] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.102 [WARNING][3067] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.102 [INFO][3067] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.112 [INFO][3067] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:01.119482 env[1840]: 2025-05-17 00:38:01.114 [INFO][3059] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:01.119399 systemd[1]: run-netns-cni\x2dbf3b7926\x2d8e54\x2d733b\x2d8ebc\x2d7ca4c6d461ce.mount: Deactivated successfully. May 17 00:38:01.121151 env[1840]: time="2025-05-17T00:38:01.121105758Z" level=info msg="TearDown network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" successfully" May 17 00:38:01.121151 env[1840]: time="2025-05-17T00:38:01.121147635Z" level=info msg="StopPodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" returns successfully" May 17 00:38:01.122130 env[1840]: time="2025-05-17T00:38:01.122094292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qfstf,Uid:ecaa0d1c-6921-4590-ad9d-12459ee26d1d,Namespace:calico-system,Attempt:1,}" May 17 00:38:01.587233 systemd-networkd[1517]: cali81971450266: Link UP May 17 00:38:01.594484 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:01.594682 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81971450266: link becomes ready May 17 00:38:01.589052 (udev-worker)[3093]: Network interface NamePolicy= disabled on kernel command line. May 17 00:38:01.592221 systemd-networkd[1517]: cali81971450266: Gained carrier May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.238 [INFO][3074] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.224-k8s-csi--node--driver--qfstf-eth0 csi-node-driver- calico-system ecaa0d1c-6921-4590-ad9d-12459ee26d1d 1261 0 2025-05-17 00:37:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 172.31.19.224 csi-node-driver-qfstf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali81971450266 [] [] }} ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.238 [INFO][3074] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.350 [INFO][3087] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" HandleID="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.353 [INFO][3087] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" HandleID="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254e0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.19.224", "pod":"csi-node-driver-qfstf", "timestamp":"2025-05-17 00:38:01.350880643 +0000 UTC"}, Hostname:"172.31.19.224", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.353 [INFO][3087] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.353 [INFO][3087] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.353 [INFO][3087] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.224' May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.395 [INFO][3087] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.443 [INFO][3087] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.467 [INFO][3087] ipam/ipam.go 511: Trying affinity for 192.168.108.64/26 host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.488 [INFO][3087] ipam/ipam.go 158: Attempting to load block cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.510 [INFO][3087] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.510 [INFO][3087] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.108.64/26 handle="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.520 [INFO][3087] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.550 [INFO][3087] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.108.64/26 handle="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.573 [INFO][3087] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.108.65/26] block=192.168.108.64/26 handle="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.573 [INFO][3087] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.108.65/26] handle="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" host="172.31.19.224" May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.573 [INFO][3087] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:01.665198 env[1840]: 2025-05-17 00:38:01.573 [INFO][3087] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.108.65/26] IPv6=[] ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" HandleID="k8s-pod-network.42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.667141 env[1840]: 2025-05-17 00:38:01.576 [INFO][3074] cni-plugin/k8s.go 418: Populated endpoint ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-csi--node--driver--qfstf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ecaa0d1c-6921-4590-ad9d-12459ee26d1d", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"", Pod:"csi-node-driver-qfstf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.108.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81971450266", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:01.667141 env[1840]: 2025-05-17 00:38:01.576 [INFO][3074] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.108.65/32] ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.667141 env[1840]: 2025-05-17 00:38:01.577 [INFO][3074] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali81971450266 ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.667141 env[1840]: 2025-05-17 00:38:01.595 [INFO][3074] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.667141 env[1840]: 2025-05-17 00:38:01.596 [INFO][3074] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-csi--node--driver--qfstf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ecaa0d1c-6921-4590-ad9d-12459ee26d1d", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef", Pod:"csi-node-driver-qfstf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.108.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81971450266", MAC:"22:00:3e:88:9b:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:01.667141 env[1840]: 2025-05-17 00:38:01.658 [INFO][3074] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef" Namespace="calico-system" Pod="csi-node-driver-qfstf" WorkloadEndpoint="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:01.704031 env[1840]: time="2025-05-17T00:38:01.703914228Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:01.704031 env[1840]: time="2025-05-17T00:38:01.703986568Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:01.704265 env[1840]: time="2025-05-17T00:38:01.704001865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:01.704451 env[1840]: time="2025-05-17T00:38:01.704292310Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef pid=3114 runtime=io.containerd.runc.v2 May 17 00:38:01.679000 audit[3098]: NETFILTER_CFG table=filter:69 family=2 entries=38 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:01.744724 kernel: kauditd_printk_skb: 520 callbacks suppressed May 17 00:38:01.744847 kernel: audit: type=1325 audit(1747442281.679:350): table=filter:69 family=2 entries=38 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:01.756690 kernel: audit: type=1300 audit(1747442281.679:350): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffc25628eb0 a2=0 a3=7ffc25628e9c items=0 ppid=2870 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:01.679000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffc25628eb0 a2=0 a3=7ffc25628e9c items=0 ppid=2870 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:01.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:01.764040 kernel: audit: type=1327 audit(1747442281.679:350): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:01.795504 env[1840]: time="2025-05-17T00:38:01.793199406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qfstf,Uid:ecaa0d1c-6921-4590-ad9d-12459ee26d1d,Namespace:calico-system,Attempt:1,} returns sandbox id \"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef\"" May 17 00:38:01.803281 env[1840]: time="2025-05-17T00:38:01.801629496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:38:01.827095 kubelet[2266]: E0517 00:38:01.827045 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:02.070957 kubelet[2266]: I0517 00:38:02.070327 2266 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:38:02.124073 systemd[1]: run-containerd-runc-k8s.io-42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef-runc.DCN9dc.mount: Deactivated successfully. May 17 00:38:02.827563 kubelet[2266]: E0517 00:38:02.827511 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:03.207300 env[1840]: time="2025-05-17T00:38:03.207192285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:03.209790 env[1840]: time="2025-05-17T00:38:03.209744125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:03.211970 env[1840]: time="2025-05-17T00:38:03.211910763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:03.215314 env[1840]: time="2025-05-17T00:38:03.215251209Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:03.215984 env[1840]: time="2025-05-17T00:38:03.215948110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:38:03.218751 env[1840]: time="2025-05-17T00:38:03.218714033Z" level=info msg="CreateContainer within sandbox \"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:38:03.247775 env[1840]: time="2025-05-17T00:38:03.247712961Z" level=info msg="CreateContainer within sandbox \"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6bf9f34310985d6899d1423ac6c5e4a45ca88c12849ef46761854698a4489ef8\"" May 17 00:38:03.248279 env[1840]: time="2025-05-17T00:38:03.248252957Z" level=info msg="StartContainer for \"6bf9f34310985d6899d1423ac6c5e4a45ca88c12849ef46761854698a4489ef8\"" May 17 00:38:03.288058 systemd[1]: run-containerd-runc-k8s.io-6bf9f34310985d6899d1423ac6c5e4a45ca88c12849ef46761854698a4489ef8-runc.fV3Mxo.mount: Deactivated successfully. May 17 00:38:03.338668 systemd-networkd[1517]: cali81971450266: Gained IPv6LL May 17 00:38:03.349044 env[1840]: time="2025-05-17T00:38:03.348856403Z" level=info msg="StartContainer for \"6bf9f34310985d6899d1423ac6c5e4a45ca88c12849ef46761854698a4489ef8\" returns successfully" May 17 00:38:03.350733 env[1840]: time="2025-05-17T00:38:03.350688468Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:38:03.518000 audit[3228]: NETFILTER_CFG table=filter:70 family=2 entries=12 op=nft_register_rule pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:03.522954 kernel: audit: type=1325 audit(1747442283.518:351): table=filter:70 family=2 entries=12 op=nft_register_rule pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:03.523094 kernel: audit: type=1300 audit(1747442283.518:351): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe5f77f410 a2=0 a3=7ffe5f77f3fc items=0 ppid=2484 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:03.518000 audit[3228]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe5f77f410 a2=0 a3=7ffe5f77f3fc items=0 ppid=2484 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:03.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:03.530816 kernel: audit: type=1327 audit(1747442283.518:351): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:03.531000 audit[3228]: NETFILTER_CFG table=nat:71 family=2 entries=34 op=nft_register_chain pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:03.531000 audit[3228]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe5f77f410 a2=0 a3=7ffe5f77f3fc items=0 ppid=2484 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:03.540070 kernel: audit: type=1325 audit(1747442283.531:352): table=nat:71 family=2 entries=34 op=nft_register_chain pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:03.540183 kernel: audit: type=1300 audit(1747442283.531:352): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe5f77f410 a2=0 a3=7ffe5f77f3fc items=0 ppid=2484 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:03.540220 kernel: audit: type=1327 audit(1747442283.531:352): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:03.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:03.828445 kubelet[2266]: E0517 00:38:03.828325 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:04.828750 kubelet[2266]: E0517 00:38:04.828708 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:04.854243 update_engine[1828]: I0517 00:38:04.853001 1828 update_attempter.cc:509] Updating boot flags... May 17 00:38:05.011688 env[1840]: time="2025-05-17T00:38:05.011623506Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:05.015335 env[1840]: time="2025-05-17T00:38:05.015289265Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:05.018766 env[1840]: time="2025-05-17T00:38:05.018718856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:05.022715 env[1840]: time="2025-05-17T00:38:05.022664285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:05.023646 env[1840]: time="2025-05-17T00:38:05.023587543Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:38:05.030676 env[1840]: time="2025-05-17T00:38:05.030343226Z" level=info msg="CreateContainer within sandbox \"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:38:05.097030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2865105615.mount: Deactivated successfully. May 17 00:38:05.103620 env[1840]: time="2025-05-17T00:38:05.103563621Z" level=info msg="CreateContainer within sandbox \"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a48d38ff4eb4f72f51810072cd8ab7b96333b0286aa6a4c20db3eea639b8a2fb\"" May 17 00:38:05.104956 env[1840]: time="2025-05-17T00:38:05.104877659Z" level=info msg="StartContainer for \"a48d38ff4eb4f72f51810072cd8ab7b96333b0286aa6a4c20db3eea639b8a2fb\"" May 17 00:38:05.215574 env[1840]: time="2025-05-17T00:38:05.215521417Z" level=info msg="StartContainer for \"a48d38ff4eb4f72f51810072cd8ab7b96333b0286aa6a4c20db3eea639b8a2fb\" returns successfully" May 17 00:38:05.830003 kubelet[2266]: E0517 00:38:05.829581 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:05.922166 kubelet[2266]: I0517 00:38:05.922140 2266 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:38:05.922166 kubelet[2266]: I0517 00:38:05.922176 2266 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:38:06.115717 env[1840]: time="2025-05-17T00:38:06.114133689Z" level=info msg="StopPodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\"" May 17 00:38:06.184106 kubelet[2266]: I0517 00:38:06.184012 2266 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qfstf" podStartSLOduration=28.957638031 podStartE2EDuration="32.18399213s" podCreationTimestamp="2025-05-17 00:37:34 +0000 UTC" firstStartedPulling="2025-05-17 00:38:01.798834815 +0000 UTC m=+28.615654060" lastFinishedPulling="2025-05-17 00:38:05.025188909 +0000 UTC m=+31.842008159" observedRunningTime="2025-05-17 00:38:05.273421971 +0000 UTC m=+32.090241238" watchObservedRunningTime="2025-05-17 00:38:06.18399213 +0000 UTC m=+33.000811393" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.184 [INFO][3464] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.184 [INFO][3464] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" iface="eth0" netns="/var/run/netns/cni-19a7e0e4-b374-3b0a-a50a-ff7866d29450" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.185 [INFO][3464] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" iface="eth0" netns="/var/run/netns/cni-19a7e0e4-b374-3b0a-a50a-ff7866d29450" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.185 [INFO][3464] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" iface="eth0" netns="/var/run/netns/cni-19a7e0e4-b374-3b0a-a50a-ff7866d29450" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.185 [INFO][3464] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.185 [INFO][3464] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.216 [INFO][3471] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.217 [INFO][3471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.217 [INFO][3471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.257 [WARNING][3471] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.257 [INFO][3471] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.260 [INFO][3471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:06.263442 env[1840]: 2025-05-17 00:38:06.261 [INFO][3464] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:06.265132 env[1840]: time="2025-05-17T00:38:06.265076657Z" level=info msg="TearDown network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" successfully" May 17 00:38:06.265284 env[1840]: time="2025-05-17T00:38:06.265263110Z" level=info msg="StopPodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" returns successfully" May 17 00:38:06.266347 env[1840]: time="2025-05-17T00:38:06.266312091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-cndx2,Uid:c857e900-0ae2-419c-b145-c787e4b86ff1,Namespace:default,Attempt:1,}" May 17 00:38:06.267671 systemd[1]: run-netns-cni\x2d19a7e0e4\x2db374\x2d3b0a\x2da50a\x2dff7866d29450.mount: Deactivated successfully. May 17 00:38:06.501577 (udev-worker)[3250]: Network interface NamePolicy= disabled on kernel command line. May 17 00:38:06.505030 systemd-networkd[1517]: cali7bef61ff477: Link UP May 17 00:38:06.507029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:06.507141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7bef61ff477: link becomes ready May 17 00:38:06.508615 systemd-networkd[1517]: cali7bef61ff477: Gained carrier May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.332 [INFO][3478] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0 nginx-deployment-8587fbcb89- default c857e900-0ae2-419c-b145-c787e4b86ff1 1308 0 2025-05-17 00:37:49 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.224 nginx-deployment-8587fbcb89-cndx2 eth0 default [] [] [kns.default ksa.default.default] cali7bef61ff477 [] [] }} ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.332 [INFO][3478] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.367 [INFO][3490] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" HandleID="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.375 [INFO][3490] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" HandleID="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023d240), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.224", "pod":"nginx-deployment-8587fbcb89-cndx2", "timestamp":"2025-05-17 00:38:06.367090901 +0000 UTC"}, Hostname:"172.31.19.224", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.375 [INFO][3490] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.375 [INFO][3490] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.375 [INFO][3490] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.224' May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.417 [INFO][3490] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.433 [INFO][3490] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.455 [INFO][3490] ipam/ipam.go 511: Trying affinity for 192.168.108.64/26 host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.467 [INFO][3490] ipam/ipam.go 158: Attempting to load block cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.472 [INFO][3490] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.473 [INFO][3490] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.108.64/26 handle="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.478 [INFO][3490] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2 May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.483 [INFO][3490] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.108.64/26 handle="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.495 [INFO][3490] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.108.66/26] block=192.168.108.64/26 handle="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.495 [INFO][3490] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.108.66/26] handle="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" host="172.31.19.224" May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.495 [INFO][3490] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:06.527041 env[1840]: 2025-05-17 00:38:06.495 [INFO][3490] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.108.66/26] IPv6=[] ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" HandleID="k8s-pod-network.c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.528080 env[1840]: 2025-05-17 00:38:06.497 [INFO][3478] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"c857e900-0ae2-419c-b145-c787e4b86ff1", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-cndx2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.108.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7bef61ff477", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:06.528080 env[1840]: 2025-05-17 00:38:06.498 [INFO][3478] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.108.66/32] ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.528080 env[1840]: 2025-05-17 00:38:06.498 [INFO][3478] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7bef61ff477 ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.528080 env[1840]: 2025-05-17 00:38:06.509 [INFO][3478] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.528080 env[1840]: 2025-05-17 00:38:06.510 [INFO][3478] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"c857e900-0ae2-419c-b145-c787e4b86ff1", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2", Pod:"nginx-deployment-8587fbcb89-cndx2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.108.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7bef61ff477", MAC:"e6:8d:67:fd:46:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:06.528080 env[1840]: 2025-05-17 00:38:06.524 [INFO][3478] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2" Namespace="default" Pod="nginx-deployment-8587fbcb89-cndx2" WorkloadEndpoint="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:06.542879 env[1840]: time="2025-05-17T00:38:06.542793659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:06.543089 env[1840]: time="2025-05-17T00:38:06.542841318Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:06.543089 env[1840]: time="2025-05-17T00:38:06.542857873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:06.543254 env[1840]: time="2025-05-17T00:38:06.543111167Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2 pid=3512 runtime=io.containerd.runc.v2 May 17 00:38:06.555000 audit[3528]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:06.555000 audit[3528]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fff217b09d0 a2=0 a3=7fff217b09bc items=0 ppid=2870 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:06.555000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:06.561177 kernel: audit: type=1325 audit(1747442286.555:353): table=filter:72 family=2 entries=42 op=nft_register_chain pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:06.630851 env[1840]: time="2025-05-17T00:38:06.630107137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-cndx2,Uid:c857e900-0ae2-419c-b145-c787e4b86ff1,Namespace:default,Attempt:1,} returns sandbox id \"c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2\"" May 17 00:38:06.631834 env[1840]: time="2025-05-17T00:38:06.631761977Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:38:06.830779 kubelet[2266]: E0517 00:38:06.830653 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:07.267534 systemd[1]: run-containerd-runc-k8s.io-c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2-runc.tL5eu9.mount: Deactivated successfully. May 17 00:38:07.755273 systemd-networkd[1517]: cali7bef61ff477: Gained IPv6LL May 17 00:38:07.831651 kubelet[2266]: E0517 00:38:07.831561 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:08.831869 kubelet[2266]: E0517 00:38:08.831799 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:09.338210 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2048990579.mount: Deactivated successfully. May 17 00:38:09.832312 kubelet[2266]: E0517 00:38:09.832238 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:10.833280 kubelet[2266]: E0517 00:38:10.833238 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:10.977172 env[1840]: time="2025-05-17T00:38:10.977090794Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:10.979878 env[1840]: time="2025-05-17T00:38:10.979837460Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:10.982654 env[1840]: time="2025-05-17T00:38:10.982590747Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:10.984999 env[1840]: time="2025-05-17T00:38:10.984963004Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:10.985541 env[1840]: time="2025-05-17T00:38:10.985507507Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:38:10.988442 env[1840]: time="2025-05-17T00:38:10.988409066Z" level=info msg="CreateContainer within sandbox \"c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" May 17 00:38:11.005886 env[1840]: time="2025-05-17T00:38:11.005744699Z" level=info msg="CreateContainer within sandbox \"c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"399ca8262054a5aff6d46aae3b704859eb2316aea534ce16c0151e3a5f9a3b33\"" May 17 00:38:11.006623 env[1840]: time="2025-05-17T00:38:11.006540742Z" level=info msg="StartContainer for \"399ca8262054a5aff6d46aae3b704859eb2316aea534ce16c0151e3a5f9a3b33\"" May 17 00:38:11.074805 env[1840]: time="2025-05-17T00:38:11.074461061Z" level=info msg="StartContainer for \"399ca8262054a5aff6d46aae3b704859eb2316aea534ce16c0151e3a5f9a3b33\" returns successfully" May 17 00:38:11.278160 kubelet[2266]: I0517 00:38:11.278086 2266 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-cndx2" podStartSLOduration=17.922081083 podStartE2EDuration="22.278068943s" podCreationTimestamp="2025-05-17 00:37:49 +0000 UTC" firstStartedPulling="2025-05-17 00:38:06.631370591 +0000 UTC m=+33.448189833" lastFinishedPulling="2025-05-17 00:38:10.987358437 +0000 UTC m=+37.804177693" observedRunningTime="2025-05-17 00:38:11.277581673 +0000 UTC m=+38.094400938" watchObservedRunningTime="2025-05-17 00:38:11.278068943 +0000 UTC m=+38.094888208" May 17 00:38:11.833974 kubelet[2266]: E0517 00:38:11.833907 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:12.000302 systemd[1]: run-containerd-runc-k8s.io-399ca8262054a5aff6d46aae3b704859eb2316aea534ce16c0151e3a5f9a3b33-runc.za5fpp.mount: Deactivated successfully. May 17 00:38:12.834512 kubelet[2266]: E0517 00:38:12.834472 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:13.808781 kubelet[2266]: E0517 00:38:13.808730 2266 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:13.835859 kubelet[2266]: E0517 00:38:13.835810 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:14.836852 kubelet[2266]: E0517 00:38:14.836774 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:15.838063 kubelet[2266]: E0517 00:38:15.838009 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:16.838623 kubelet[2266]: E0517 00:38:16.838575 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:17.515874 amazon-ssm-agent[1812]: 2025-05-17 00:38:17 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 17 00:38:17.839552 kubelet[2266]: E0517 00:38:17.839355 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:18.840088 kubelet[2266]: E0517 00:38:18.839903 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:19.840817 kubelet[2266]: E0517 00:38:19.840670 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:20.842051 kubelet[2266]: E0517 00:38:20.841979 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:21.842916 kubelet[2266]: E0517 00:38:21.842858 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:22.268000 audit[3615]: NETFILTER_CFG table=filter:73 family=2 entries=24 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:22.271126 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:38:22.271233 kernel: audit: type=1325 audit(1747442302.268:354): table=filter:73 family=2 entries=24 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:22.268000 audit[3615]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe7ca130a0 a2=0 a3=7ffe7ca1308c items=0 ppid=2484 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.280314 kernel: audit: type=1300 audit(1747442302.268:354): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffe7ca130a0 a2=0 a3=7ffe7ca1308c items=0 ppid=2484 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.280481 kernel: audit: type=1327 audit(1747442302.268:354): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:22.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:22.282000 audit[3615]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:22.283949 kernel: audit: type=1325 audit(1747442302.282:355): table=nat:74 family=2 entries=22 op=nft_register_rule pid=3615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:22.282000 audit[3615]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7ca130a0 a2=0 a3=0 items=0 ppid=2484 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.291845 kernel: audit: type=1300 audit(1747442302.282:355): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe7ca130a0 a2=0 a3=0 items=0 ppid=2484 pid=3615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:22.291965 kernel: audit: type=1327 audit(1747442302.282:355): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:22.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:22.844016 kubelet[2266]: E0517 00:38:22.843968 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:23.844149 kubelet[2266]: E0517 00:38:23.844108 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:24.744000 audit[3617]: NETFILTER_CFG table=filter:75 family=2 entries=36 op=nft_register_rule pid=3617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:24.744000 audit[3617]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd51fea970 a2=0 a3=7ffd51fea95c items=0 ppid=2484 pid=3617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.753805 kernel: audit: type=1325 audit(1747442304.744:356): table=filter:75 family=2 entries=36 op=nft_register_rule pid=3617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:24.753966 kernel: audit: type=1300 audit(1747442304.744:356): arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd51fea970 a2=0 a3=7ffd51fea95c items=0 ppid=2484 pid=3617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.754022 kernel: audit: type=1327 audit(1747442304.744:356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:24.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:24.758000 audit[3617]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:24.758000 audit[3617]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd51fea970 a2=0 a3=0 items=0 ppid=2484 pid=3617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:24.762162 kernel: audit: type=1325 audit(1747442304.758:357): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:24.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:24.845208 kubelet[2266]: E0517 00:38:24.845166 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:25.846192 kubelet[2266]: E0517 00:38:25.846143 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:26.846843 kubelet[2266]: E0517 00:38:26.846777 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:27.351382 kubelet[2266]: I0517 00:38:27.351324 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ed11d475-673b-485b-9225-35399b69ddaf-data\") pod \"nfs-server-provisioner-0\" (UID: \"ed11d475-673b-485b-9225-35399b69ddaf\") " pod="default/nfs-server-provisioner-0" May 17 00:38:27.353713 kubelet[2266]: I0517 00:38:27.353510 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rs2q2\" (UniqueName: \"kubernetes.io/projected/ed11d475-673b-485b-9225-35399b69ddaf-kube-api-access-rs2q2\") pod \"nfs-server-provisioner-0\" (UID: \"ed11d475-673b-485b-9225-35399b69ddaf\") " pod="default/nfs-server-provisioner-0" May 17 00:38:27.638678 env[1840]: time="2025-05-17T00:38:27.638221487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed11d475-673b-485b-9225-35399b69ddaf,Namespace:default,Attempt:0,}" May 17 00:38:27.847809 kubelet[2266]: E0517 00:38:27.847743 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:27.983015 systemd-networkd[1517]: cali60e51b789ff: Link UP May 17 00:38:27.988005 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:27.988130 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready May 17 00:38:27.987652 systemd-networkd[1517]: cali60e51b789ff: Gained carrier May 17 00:38:27.988499 (udev-worker)[3642]: Network interface NamePolicy= disabled on kernel command line. May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.749 [INFO][3622] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.224-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ed11d475-673b-485b-9225-35399b69ddaf 1388 0 2025-05-17 00:38:26 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.31.19.224 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.749 [INFO][3622] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.873 [INFO][3635] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" HandleID="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Workload="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.874 [INFO][3635] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" HandleID="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Workload="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cf0b0), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.224", "pod":"nfs-server-provisioner-0", "timestamp":"2025-05-17 00:38:27.873806418 +0000 UTC"}, Hostname:"172.31.19.224", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.874 [INFO][3635] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.874 [INFO][3635] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.874 [INFO][3635] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.224' May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.894 [INFO][3635] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.903 [INFO][3635] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.914 [INFO][3635] ipam/ipam.go 511: Trying affinity for 192.168.108.64/26 host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.918 [INFO][3635] ipam/ipam.go 158: Attempting to load block cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.922 [INFO][3635] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.922 [INFO][3635] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.108.64/26 handle="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.955 [INFO][3635] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367 May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.967 [INFO][3635] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.108.64/26 handle="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.977 [INFO][3635] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.108.67/26] block=192.168.108.64/26 handle="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.978 [INFO][3635] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.108.67/26] handle="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" host="172.31.19.224" May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.978 [INFO][3635] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:28.003591 env[1840]: 2025-05-17 00:38:27.978 [INFO][3635] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.108.67/26] IPv6=[] ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" HandleID="k8s-pod-network.9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Workload="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.004890 env[1840]: 2025-05-17 00:38:27.979 [INFO][3622] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed11d475-673b-485b-9225-35399b69ddaf", ResourceVersion:"1388", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 38, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.108.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:28.004890 env[1840]: 2025-05-17 00:38:27.979 [INFO][3622] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.108.67/32] ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.004890 env[1840]: 2025-05-17 00:38:27.980 [INFO][3622] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.004890 env[1840]: 2025-05-17 00:38:27.988 [INFO][3622] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.005217 env[1840]: 2025-05-17 00:38:27.989 [INFO][3622] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ed11d475-673b-485b-9225-35399b69ddaf", ResourceVersion:"1388", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 38, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.108.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ca:f2:27:d2:e4:c8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:28.005217 env[1840]: 2025-05-17 00:38:28.002 [INFO][3622] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.19.224-k8s-nfs--server--provisioner--0-eth0" May 17 00:38:28.018423 env[1840]: time="2025-05-17T00:38:28.018338623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:28.018632 env[1840]: time="2025-05-17T00:38:28.018396447Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:28.018632 env[1840]: time="2025-05-17T00:38:28.018412309Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:28.018632 env[1840]: time="2025-05-17T00:38:28.018563794Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367 pid=3658 runtime=io.containerd.runc.v2 May 17 00:38:28.104780 env[1840]: time="2025-05-17T00:38:28.104702104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ed11d475-673b-485b-9225-35399b69ddaf,Namespace:default,Attempt:0,} returns sandbox id \"9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367\"" May 17 00:38:28.107358 env[1840]: time="2025-05-17T00:38:28.107318734Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" May 17 00:38:28.116000 audit[3693]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=3693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:28.119475 kernel: kauditd_printk_skb: 2 callbacks suppressed May 17 00:38:28.119573 kernel: audit: type=1325 audit(1747442308.116:358): table=filter:77 family=2 entries=40 op=nft_register_chain pid=3693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:28.116000 audit[3693]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fff7fc9e070 a2=0 a3=7fff7fc9e05c items=0 ppid=2870 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:28.131731 kernel: audit: type=1300 audit(1747442308.116:358): arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fff7fc9e070 a2=0 a3=7fff7fc9e05c items=0 ppid=2870 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:28.132966 kernel: audit: type=1327 audit(1747442308.116:358): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:28.116000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:28.851206 kubelet[2266]: E0517 00:38:28.851157 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:29.578104 systemd-networkd[1517]: cali60e51b789ff: Gained IPv6LL May 17 00:38:29.851953 kubelet[2266]: E0517 00:38:29.851551 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:30.691407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2825814403.mount: Deactivated successfully. May 17 00:38:30.854744 kubelet[2266]: E0517 00:38:30.854668 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:31.855143 kubelet[2266]: E0517 00:38:31.855076 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:32.855260 kubelet[2266]: E0517 00:38:32.855217 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:32.869235 env[1840]: time="2025-05-17T00:38:32.869143369Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:32.873377 env[1840]: time="2025-05-17T00:38:32.873332527Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:32.876821 env[1840]: time="2025-05-17T00:38:32.876748187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:32.880054 env[1840]: time="2025-05-17T00:38:32.880009027Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:32.880955 env[1840]: time="2025-05-17T00:38:32.880877910Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" May 17 00:38:32.886828 env[1840]: time="2025-05-17T00:38:32.886788105Z" level=info msg="CreateContainer within sandbox \"9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" May 17 00:38:32.905987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1307374577.mount: Deactivated successfully. May 17 00:38:32.915537 env[1840]: time="2025-05-17T00:38:32.915463603Z" level=info msg="CreateContainer within sandbox \"9e064b9253ae51f200711c8e8677295c3a9a0cf995c4e12a42904bfef3537367\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"da911cf2e747a0fa2f6f79ee824290ba7e0a8a94f8553c85040611ea82628d69\"" May 17 00:38:32.916271 env[1840]: time="2025-05-17T00:38:32.916239672Z" level=info msg="StartContainer for \"da911cf2e747a0fa2f6f79ee824290ba7e0a8a94f8553c85040611ea82628d69\"" May 17 00:38:32.986361 env[1840]: time="2025-05-17T00:38:32.986311495Z" level=info msg="StartContainer for \"da911cf2e747a0fa2f6f79ee824290ba7e0a8a94f8553c85040611ea82628d69\" returns successfully" May 17 00:38:33.726000 audit[3764]: NETFILTER_CFG table=filter:78 family=2 entries=24 op=nft_register_rule pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.726000 audit[3764]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff30867850 a2=0 a3=7fff3086783c items=0 ppid=2484 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.735827 kernel: audit: type=1325 audit(1747442313.726:359): table=filter:78 family=2 entries=24 op=nft_register_rule pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.736012 kernel: audit: type=1300 audit(1747442313.726:359): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff30867850 a2=0 a3=7fff3086783c items=0 ppid=2484 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.736068 kernel: audit: type=1327 audit(1747442313.726:359): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.738000 audit[3764]: NETFILTER_CFG table=nat:79 family=2 entries=106 op=nft_register_chain pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.738000 audit[3764]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff30867850 a2=0 a3=7fff3086783c items=0 ppid=2484 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.747525 kernel: audit: type=1325 audit(1747442313.738:360): table=nat:79 family=2 entries=106 op=nft_register_chain pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:38:33.747628 kernel: audit: type=1300 audit(1747442313.738:360): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff30867850 a2=0 a3=7fff3086783c items=0 ppid=2484 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:33.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.750199 kernel: audit: type=1327 audit(1747442313.738:360): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:38:33.808604 kubelet[2266]: E0517 00:38:33.808543 2266 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:33.849701 env[1840]: time="2025-05-17T00:38:33.849284846Z" level=info msg="StopPodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\"" May 17 00:38:33.855451 kubelet[2266]: E0517 00:38:33.855415 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.912 [WARNING][3774] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-csi--node--driver--qfstf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ecaa0d1c-6921-4590-ad9d-12459ee26d1d", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef", Pod:"csi-node-driver-qfstf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.108.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81971450266", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.912 [INFO][3774] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.912 [INFO][3774] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" iface="eth0" netns="" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.912 [INFO][3774] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.912 [INFO][3774] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.967 [INFO][3782] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.967 [INFO][3782] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.967 [INFO][3782] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.987 [WARNING][3782] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.987 [INFO][3782] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.990 [INFO][3782] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:33.993078 env[1840]: 2025-05-17 00:38:33.991 [INFO][3774] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:33.993078 env[1840]: time="2025-05-17T00:38:33.992832593Z" level=info msg="TearDown network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" successfully" May 17 00:38:33.993078 env[1840]: time="2025-05-17T00:38:33.992869031Z" level=info msg="StopPodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" returns successfully" May 17 00:38:33.994987 env[1840]: time="2025-05-17T00:38:33.994391103Z" level=info msg="RemovePodSandbox for \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\"" May 17 00:38:33.994987 env[1840]: time="2025-05-17T00:38:33.994429555Z" level=info msg="Forcibly stopping sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\"" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.065 [WARNING][3798] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-csi--node--driver--qfstf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ecaa0d1c-6921-4590-ad9d-12459ee26d1d", ResourceVersion:"1294", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"42b01bdb1a94a89df30db3c2cb6169ae9340bda76685f699b173b7847795ecef", Pod:"csi-node-driver-qfstf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.108.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali81971450266", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.065 [INFO][3798] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.065 [INFO][3798] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" iface="eth0" netns="" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.065 [INFO][3798] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.065 [INFO][3798] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.135 [INFO][3805] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.135 [INFO][3805] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.135 [INFO][3805] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.151 [WARNING][3805] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.151 [INFO][3805] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" HandleID="k8s-pod-network.322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" Workload="172.31.19.224-k8s-csi--node--driver--qfstf-eth0" May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.153 [INFO][3805] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:34.157112 env[1840]: 2025-05-17 00:38:34.155 [INFO][3798] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc" May 17 00:38:34.158270 env[1840]: time="2025-05-17T00:38:34.157152880Z" level=info msg="TearDown network for sandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" successfully" May 17 00:38:34.164680 env[1840]: time="2025-05-17T00:38:34.164534419Z" level=info msg="RemovePodSandbox \"322696a57c11e489f63b6b3db847048aee6919d10b59d5e3615631f60cd30ffc\" returns successfully" May 17 00:38:34.165203 env[1840]: time="2025-05-17T00:38:34.165169760Z" level=info msg="StopPodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\"" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.234 [WARNING][3821] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"c857e900-0ae2-419c-b145-c787e4b86ff1", ResourceVersion:"1337", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2", Pod:"nginx-deployment-8587fbcb89-cndx2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.108.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7bef61ff477", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.234 [INFO][3821] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.234 [INFO][3821] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" iface="eth0" netns="" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.234 [INFO][3821] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.234 [INFO][3821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.258 [INFO][3828] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.258 [INFO][3828] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.258 [INFO][3828] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.266 [WARNING][3828] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.267 [INFO][3828] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.269 [INFO][3828] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:34.271986 env[1840]: 2025-05-17 00:38:34.270 [INFO][3821] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.271986 env[1840]: time="2025-05-17T00:38:34.271902555Z" level=info msg="TearDown network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" successfully" May 17 00:38:34.271986 env[1840]: time="2025-05-17T00:38:34.271950313Z" level=info msg="StopPodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" returns successfully" May 17 00:38:34.273434 env[1840]: time="2025-05-17T00:38:34.273378876Z" level=info msg="RemovePodSandbox for \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\"" May 17 00:38:34.273434 env[1840]: time="2025-05-17T00:38:34.273416299Z" level=info msg="Forcibly stopping sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\"" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.323 [WARNING][3842] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"c857e900-0ae2-419c-b145-c787e4b86ff1", ResourceVersion:"1337", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 37, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"c5d6d7bdedf5ec857985501fa9168e2bd32dfffe6cf57898bce9afabe28b23d2", Pod:"nginx-deployment-8587fbcb89-cndx2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.108.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7bef61ff477", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.324 [INFO][3842] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.324 [INFO][3842] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" iface="eth0" netns="" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.324 [INFO][3842] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.324 [INFO][3842] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.350 [INFO][3849] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.350 [INFO][3849] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.350 [INFO][3849] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.359 [WARNING][3849] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.359 [INFO][3849] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" HandleID="k8s-pod-network.9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" Workload="172.31.19.224-k8s-nginx--deployment--8587fbcb89--cndx2-eth0" May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.360 [INFO][3849] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:34.363704 env[1840]: 2025-05-17 00:38:34.362 [INFO][3842] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc" May 17 00:38:34.364772 env[1840]: time="2025-05-17T00:38:34.363743581Z" level=info msg="TearDown network for sandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" successfully" May 17 00:38:34.367612 env[1840]: time="2025-05-17T00:38:34.367568742Z" level=info msg="RemovePodSandbox \"9ec0e43f9dddcce2464c76458067541b3e979f2a1aab2155596484c6a73789cc\" returns successfully" May 17 00:38:34.856331 kubelet[2266]: E0517 00:38:34.856295 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:35.856709 kubelet[2266]: E0517 00:38:35.856668 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:36.857513 kubelet[2266]: E0517 00:38:36.857469 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:37.858220 kubelet[2266]: E0517 00:38:37.858176 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:38.000054 amazon-ssm-agent[1812]: 2025-05-17 00:38:37 INFO [HealthCheck] HealthCheck reporting agent health. May 17 00:38:38.859162 kubelet[2266]: E0517 00:38:38.859058 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:39.859969 kubelet[2266]: E0517 00:38:39.859898 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:40.860954 kubelet[2266]: E0517 00:38:40.860881 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:41.862189 kubelet[2266]: E0517 00:38:41.862137 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:42.862669 kubelet[2266]: E0517 00:38:42.862624 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:43.863861 kubelet[2266]: E0517 00:38:43.863773 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:44.864808 kubelet[2266]: E0517 00:38:44.864758 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:45.865982 kubelet[2266]: E0517 00:38:45.865899 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:46.866576 kubelet[2266]: E0517 00:38:46.866504 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:47.867376 kubelet[2266]: E0517 00:38:47.867333 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:48.868101 kubelet[2266]: E0517 00:38:48.868043 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:49.868388 kubelet[2266]: E0517 00:38:49.868197 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:50.868807 kubelet[2266]: E0517 00:38:50.868752 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:51.870055 kubelet[2266]: E0517 00:38:51.869946 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:52.870693 kubelet[2266]: E0517 00:38:52.870640 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:53.809548 kubelet[2266]: E0517 00:38:53.809468 2266 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:53.871779 kubelet[2266]: E0517 00:38:53.871703 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:54.872620 kubelet[2266]: E0517 00:38:54.872566 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:55.873111 kubelet[2266]: E0517 00:38:55.873051 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:56.873622 kubelet[2266]: E0517 00:38:56.873566 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:57.874487 kubelet[2266]: E0517 00:38:57.874437 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:58.027754 kubelet[2266]: I0517 00:38:58.027697 2266 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=27.25215331 podStartE2EDuration="32.027658s" podCreationTimestamp="2025-05-17 00:38:26 +0000 UTC" firstStartedPulling="2025-05-17 00:38:28.106659288 +0000 UTC m=+54.923478537" lastFinishedPulling="2025-05-17 00:38:32.882163981 +0000 UTC m=+59.698983227" observedRunningTime="2025-05-17 00:38:33.345860939 +0000 UTC m=+60.162680213" watchObservedRunningTime="2025-05-17 00:38:58.027658 +0000 UTC m=+84.844477246" May 17 00:38:58.095537 kubelet[2266]: I0517 00:38:58.095465 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gv7kj\" (UniqueName: \"kubernetes.io/projected/9792ec1e-fb75-4757-b09d-7a380a30f4e8-kube-api-access-gv7kj\") pod \"test-pod-1\" (UID: \"9792ec1e-fb75-4757-b09d-7a380a30f4e8\") " pod="default/test-pod-1" May 17 00:38:58.095537 kubelet[2266]: I0517 00:38:58.095527 2266 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f66acc50-e46e-4a1c-836f-e3d1c9b5931b\" (UniqueName: \"kubernetes.io/nfs/9792ec1e-fb75-4757-b09d-7a380a30f4e8-pvc-f66acc50-e46e-4a1c-836f-e3d1c9b5931b\") pod \"test-pod-1\" (UID: \"9792ec1e-fb75-4757-b09d-7a380a30f4e8\") " pod="default/test-pod-1" May 17 00:38:58.267246 kernel: Failed to create system directory netfs May 17 00:38:58.267395 kernel: audit: type=1400 audit(1747442338.255:361): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.267429 kernel: Failed to create system directory netfs May 17 00:38:58.267448 kernel: audit: type=1400 audit(1747442338.255:361): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.267468 kernel: Failed to create system directory netfs May 17 00:38:58.255000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.255000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.273567 kernel: audit: type=1400 audit(1747442338.255:361): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.273792 kernel: Failed to create system directory netfs May 17 00:38:58.255000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.281035 kernel: audit: type=1400 audit(1747442338.255:361): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.255000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.255000 audit[3936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5612693485e0 a1=153bc a2=5612547002b0 a3=5 items=0 ppid=55 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:58.255000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:58.297313 kernel: audit: type=1300 audit(1747442338.255:361): arch=c000003e syscall=175 success=yes exit=0 a0=5612693485e0 a1=153bc a2=5612547002b0 a3=5 items=0 ppid=55 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:58.297428 kernel: audit: type=1327 audit(1747442338.255:361): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:58.297450 kernel: Failed to create system directory fscache May 17 00:38:58.297474 kernel: audit: type=1400 audit(1747442338.286:362): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.304959 kernel: Failed to create system directory fscache May 17 00:38:58.305045 kernel: audit: type=1400 audit(1747442338.286:362): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.311740 kernel: Failed to create system directory fscache May 17 00:38:58.311821 kernel: audit: type=1400 audit(1747442338.286:362): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.318457 kernel: Failed to create system directory fscache May 17 00:38:58.318534 kernel: audit: type=1400 audit(1747442338.286:362): avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.325225 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.327146 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.328784 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.332036 kernel: Failed to create system directory fscache May 17 00:38:58.332124 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.333600 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.335192 kernel: Failed to create system directory fscache May 17 00:38:58.335331 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.338036 kernel: Failed to create system directory fscache May 17 00:38:58.338119 kernel: Failed to create system directory fscache May 17 00:38:58.286000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.342167 kernel: FS-Cache: Loaded May 17 00:38:58.286000 audit[3936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56126955d9c0 a1=4c0fc a2=5612547002b0 a3=5 items=0 ppid=55 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:58.286000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.446941 kernel: Failed to create system directory sunrpc May 17 00:38:58.447069 kernel: Failed to create system directory sunrpc May 17 00:38:58.447101 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.449584 kernel: Failed to create system directory sunrpc May 17 00:38:58.449750 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.453360 kernel: Failed to create system directory sunrpc May 17 00:38:58.453437 kernel: Failed to create system directory sunrpc May 17 00:38:58.453479 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.455810 kernel: Failed to create system directory sunrpc May 17 00:38:58.455916 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.458176 kernel: Failed to create system directory sunrpc May 17 00:38:58.458269 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.460466 kernel: Failed to create system directory sunrpc May 17 00:38:58.460556 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.462690 kernel: Failed to create system directory sunrpc May 17 00:38:58.462781 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.464817 kernel: Failed to create system directory sunrpc May 17 00:38:58.464881 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.466905 kernel: Failed to create system directory sunrpc May 17 00:38:58.466999 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.469820 kernel: Failed to create system directory sunrpc May 17 00:38:58.469878 kernel: Failed to create system directory sunrpc May 17 00:38:58.469940 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.471715 kernel: Failed to create system directory sunrpc May 17 00:38:58.471775 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.473470 kernel: Failed to create system directory sunrpc May 17 00:38:58.473525 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.475265 kernel: Failed to create system directory sunrpc May 17 00:38:58.475315 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.477030 kernel: Failed to create system directory sunrpc May 17 00:38:58.477088 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.477950 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.479680 kernel: Failed to create system directory sunrpc May 17 00:38:58.479726 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.481446 kernel: Failed to create system directory sunrpc May 17 00:38:58.481499 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.483431 kernel: Failed to create system directory sunrpc May 17 00:38:58.483490 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.485167 kernel: Failed to create system directory sunrpc May 17 00:38:58.485228 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.486171 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.488715 kernel: Failed to create system directory sunrpc May 17 00:38:58.488762 kernel: Failed to create system directory sunrpc May 17 00:38:58.488788 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.490441 kernel: Failed to create system directory sunrpc May 17 00:38:58.490502 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.492149 kernel: Failed to create system directory sunrpc May 17 00:38:58.492201 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.494709 kernel: Failed to create system directory sunrpc May 17 00:38:58.494762 kernel: Failed to create system directory sunrpc May 17 00:38:58.494791 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.496438 kernel: Failed to create system directory sunrpc May 17 00:38:58.496482 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.498229 kernel: Failed to create system directory sunrpc May 17 00:38:58.498283 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.500745 kernel: Failed to create system directory sunrpc May 17 00:38:58.500784 kernel: Failed to create system directory sunrpc May 17 00:38:58.500835 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.502473 kernel: Failed to create system directory sunrpc May 17 00:38:58.502515 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.504188 kernel: Failed to create system directory sunrpc May 17 00:38:58.504246 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.506088 kernel: Failed to create system directory sunrpc May 17 00:38:58.506144 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.507809 kernel: Failed to create system directory sunrpc May 17 00:38:58.507850 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.509537 kernel: Failed to create system directory sunrpc May 17 00:38:58.509578 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.511416 kernel: Failed to create system directory sunrpc May 17 00:38:58.511481 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.513139 kernel: Failed to create system directory sunrpc May 17 00:38:58.513191 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.515841 kernel: Failed to create system directory sunrpc May 17 00:38:58.515933 kernel: Failed to create system directory sunrpc May 17 00:38:58.515969 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.517606 kernel: Failed to create system directory sunrpc May 17 00:38:58.517761 kernel: Failed to create system directory sunrpc May 17 00:38:58.522216 kernel: Failed to create system directory sunrpc May 17 00:38:58.522307 kernel: Failed to create system directory sunrpc May 17 00:38:58.522348 kernel: Failed to create system directory sunrpc May 17 00:38:58.522379 kernel: Failed to create system directory sunrpc May 17 00:38:58.522405 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.523789 kernel: Failed to create system directory sunrpc May 17 00:38:58.523840 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.525503 kernel: Failed to create system directory sunrpc May 17 00:38:58.525576 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.527377 kernel: Failed to create system directory sunrpc May 17 00:38:58.527421 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.529093 kernel: Failed to create system directory sunrpc May 17 00:38:58.529136 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.530812 kernel: Failed to create system directory sunrpc May 17 00:38:58.530852 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.532525 kernel: Failed to create system directory sunrpc May 17 00:38:58.532567 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.534241 kernel: Failed to create system directory sunrpc May 17 00:38:58.534285 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.536851 kernel: Failed to create system directory sunrpc May 17 00:38:58.536945 kernel: Failed to create system directory sunrpc May 17 00:38:58.536975 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.538616 kernel: Failed to create system directory sunrpc May 17 00:38:58.538669 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.540321 kernel: Failed to create system directory sunrpc May 17 00:38:58.540360 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.542161 kernel: Failed to create system directory sunrpc May 17 00:38:58.542208 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.544715 kernel: Failed to create system directory sunrpc May 17 00:38:58.544770 kernel: Failed to create system directory sunrpc May 17 00:38:58.544818 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.546442 kernel: Failed to create system directory sunrpc May 17 00:38:58.546536 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.548132 kernel: Failed to create system directory sunrpc May 17 00:38:58.548186 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.549821 kernel: Failed to create system directory sunrpc May 17 00:38:58.549878 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.551518 kernel: Failed to create system directory sunrpc May 17 00:38:58.551560 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.553226 kernel: Failed to create system directory sunrpc May 17 00:38:58.553281 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.555837 kernel: Failed to create system directory sunrpc May 17 00:38:58.555896 kernel: Failed to create system directory sunrpc May 17 00:38:58.555961 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.557539 kernel: Failed to create system directory sunrpc May 17 00:38:58.557584 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.559238 kernel: Failed to create system directory sunrpc May 17 00:38:58.559289 kernel: Failed to create system directory sunrpc May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.428000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.561025 kernel: Failed to create system directory sunrpc May 17 00:38:58.571535 kernel: RPC: Registered named UNIX socket transport module. May 17 00:38:58.571677 kernel: RPC: Registered udp transport module. May 17 00:38:58.571708 kernel: RPC: Registered tcp transport module. May 17 00:38:58.573317 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. May 17 00:38:58.428000 audit[3936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5612695a9ad0 a1=1a814c a2=5612547002b0 a3=5 items=6 ppid=55 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:58.428000 audit: CWD cwd="/" May 17 00:38:58.428000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:58.428000 audit: PATH item=1 name=(null) inode=23984 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:58.428000 audit: PATH item=2 name=(null) inode=23984 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:58.428000 audit: PATH item=3 name=(null) inode=23985 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:58.428000 audit: PATH item=4 name=(null) inode=23984 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:58.428000 audit: PATH item=5 name=(null) inode=23986 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:38:58.428000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.651045 kernel: Failed to create system directory nfs May 17 00:38:58.651172 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.652654 kernel: Failed to create system directory nfs May 17 00:38:58.652738 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.653396 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.654189 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.654992 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.656685 kernel: Failed to create system directory nfs May 17 00:38:58.656779 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.657917 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.658637 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.659554 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.660449 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.661361 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.663137 kernel: Failed to create system directory nfs May 17 00:38:58.663202 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.665893 kernel: Failed to create system directory nfs May 17 00:38:58.665992 kernel: Failed to create system directory nfs May 17 00:38:58.666021 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.666708 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.668439 kernel: Failed to create system directory nfs May 17 00:38:58.668513 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.670206 kernel: Failed to create system directory nfs May 17 00:38:58.670283 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.672819 kernel: Failed to create system directory nfs May 17 00:38:58.672900 kernel: Failed to create system directory nfs May 17 00:38:58.672938 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.674587 kernel: Failed to create system directory nfs May 17 00:38:58.674694 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.676325 kernel: Failed to create system directory nfs May 17 00:38:58.676389 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.678238 kernel: Failed to create system directory nfs May 17 00:38:58.678312 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.680802 kernel: Failed to create system directory nfs May 17 00:38:58.680853 kernel: Failed to create system directory nfs May 17 00:38:58.680898 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.682456 kernel: Failed to create system directory nfs May 17 00:38:58.682501 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.684097 kernel: Failed to create system directory nfs May 17 00:38:58.684152 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.685780 kernel: Failed to create system directory nfs May 17 00:38:58.685854 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.686599 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.687439 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.688272 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.690746 kernel: Failed to create system directory nfs May 17 00:38:58.690787 kernel: Failed to create system directory nfs May 17 00:38:58.690847 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.692358 kernel: Failed to create system directory nfs May 17 00:38:58.692412 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.693173 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.693984 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.695629 kernel: Failed to create system directory nfs May 17 00:38:58.695711 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.696433 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.697249 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.698098 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.699703 kernel: Failed to create system directory nfs May 17 00:38:58.699742 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.638000 audit[3936]: AVC avc: denied { confidentiality } for pid=3936 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.701353 kernel: Failed to create system directory nfs May 17 00:38:58.638000 audit[3936]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5612697caa10 a1=16eae4 a2=5612547002b0 a3=5 items=0 ppid=55 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:58.724171 kernel: FS-Cache: Netfs 'nfs' registered for caching May 17 00:38:58.638000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.774046 kernel: Failed to create system directory nfs4 May 17 00:38:58.774154 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.775214 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.776445 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.777628 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.778724 kernel: Failed to create system directory nfs4 May 17 00:38:58.778792 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.780561 kernel: Failed to create system directory nfs4 May 17 00:38:58.780604 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.782356 kernel: Failed to create system directory nfs4 May 17 00:38:58.782402 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.784080 kernel: Failed to create system directory nfs4 May 17 00:38:58.784133 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.785823 kernel: Failed to create system directory nfs4 May 17 00:38:58.785875 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.786710 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.787598 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.789358 kernel: Failed to create system directory nfs4 May 17 00:38:58.789409 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.791131 kernel: Failed to create system directory nfs4 May 17 00:38:58.791179 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.792024 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.793778 kernel: Failed to create system directory nfs4 May 17 00:38:58.793824 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.794665 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.796524 kernel: Failed to create system directory nfs4 May 17 00:38:58.796576 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.798407 kernel: Failed to create system directory nfs4 May 17 00:38:58.798452 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.800218 kernel: Failed to create system directory nfs4 May 17 00:38:58.800269 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.801133 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.802018 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.803753 kernel: Failed to create system directory nfs4 May 17 00:38:58.803794 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.804634 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.805506 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.806408 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.808054 kernel: Failed to create system directory nfs4 May 17 00:38:58.808094 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.809768 kernel: Failed to create system directory nfs4 May 17 00:38:58.809815 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.810611 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.811476 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.812317 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.813165 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.814201 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.815755 kernel: Failed to create system directory nfs4 May 17 00:38:58.815796 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.816659 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.818366 kernel: Failed to create system directory nfs4 May 17 00:38:58.818437 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.819215 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.820066 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.821775 kernel: Failed to create system directory nfs4 May 17 00:38:58.821819 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.822613 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.824322 kernel: Failed to create system directory nfs4 May 17 00:38:58.824367 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.825183 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.826044 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.827732 kernel: Failed to create system directory nfs4 May 17 00:38:58.827772 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.829362 kernel: Failed to create system directory nfs4 May 17 00:38:58.829400 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.831160 kernel: Failed to create system directory nfs4 May 17 00:38:58.831244 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.833766 kernel: Failed to create system directory nfs4 May 17 00:38:58.833811 kernel: Failed to create system directory nfs4 May 17 00:38:58.833852 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.835477 kernel: Failed to create system directory nfs4 May 17 00:38:58.835560 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.836354 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.838012 kernel: Failed to create system directory nfs4 May 17 00:38:58.838057 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.839720 kernel: Failed to create system directory nfs4 May 17 00:38:58.839760 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.841385 kernel: Failed to create system directory nfs4 May 17 00:38:58.841460 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.842283 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.843992 kernel: Failed to create system directory nfs4 May 17 00:38:58.844032 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.845722 kernel: Failed to create system directory nfs4 May 17 00:38:58.845768 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.846491 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.847340 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.848197 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.850768 kernel: Failed to create system directory nfs4 May 17 00:38:58.850808 kernel: Failed to create system directory nfs4 May 17 00:38:58.850869 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.851609 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.852459 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.853307 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.854163 kernel: Failed to create system directory nfs4 May 17 00:38:58.755000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:58.875485 kubelet[2266]: E0517 00:38:58.875387 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:59.007093 kernel: NFS: Registering the id_resolver key type May 17 00:38:59.007255 kernel: Key type id_resolver registered May 17 00:38:59.007284 kernel: Key type id_legacy registered May 17 00:38:58.755000 audit[3941]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa0e05ec010 a1=209404 a2=557bf72072b0 a3=5 items=0 ppid=55 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:58.755000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.025078 kernel: Failed to create system directory rpcgss May 17 00:38:59.025377 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.030166 kernel: Failed to create system directory rpcgss May 17 00:38:59.030255 kernel: Failed to create system directory rpcgss May 17 00:38:59.030288 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.032794 kernel: Failed to create system directory rpcgss May 17 00:38:59.032845 kernel: Failed to create system directory rpcgss May 17 00:38:59.032891 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.033668 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.034629 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.036436 kernel: Failed to create system directory rpcgss May 17 00:38:59.036479 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.038252 kernel: Failed to create system directory rpcgss May 17 00:38:59.038296 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.040053 kernel: Failed to create system directory rpcgss May 17 00:38:59.040095 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.041858 kernel: Failed to create system directory rpcgss May 17 00:38:59.041936 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.043685 kernel: Failed to create system directory rpcgss May 17 00:38:59.043727 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.045509 kernel: Failed to create system directory rpcgss May 17 00:38:59.045579 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.047418 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.048411 kernel: Failed to create system directory rpcgss May 17 00:38:59.048531 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.018000 audit[3942]: AVC avc: denied { confidentiality } for pid=3942 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:38:59.050408 kernel: Failed to create system directory rpcgss May 17 00:38:59.018000 audit[3942]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f9a92850010 a1=70b64 a2=5591480102b0 a3=5 items=0 ppid=55 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:59.018000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 May 17 00:38:59.142198 nfsidmap[3949]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 17 00:38:59.146456 nfsidmap[3950]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal' May 17 00:38:59.154000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:59.154000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:59.154000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:59.154000 audit[2053]: AVC avc: denied { watch_reads } for pid=2053 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:59.154000 audit[2053]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5653375c82a0 a2=10 a3=2be8eeda96720cc9 items=0 ppid=1 pid=2053 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:59.154000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:38:59.155000 audit[2053]: AVC avc: denied { watch_reads } for pid=2053 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:59.155000 audit[2053]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5653375c82a0 a2=10 a3=2be8eeda96720cc9 items=0 ppid=1 pid=2053 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:59.155000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:38:59.155000 audit[2053]: AVC avc: denied { watch_reads } for pid=2053 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2729 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 May 17 00:38:59.155000 audit[2053]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5653375c82a0 a2=10 a3=2be8eeda96720cc9 items=0 ppid=1 pid=2053 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:59.155000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 May 17 00:38:59.231370 env[1840]: time="2025-05-17T00:38:59.231310857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9792ec1e-fb75-4757-b09d-7a380a30f4e8,Namespace:default,Attempt:0,}" May 17 00:38:59.433852 (udev-worker)[3946]: Network interface NamePolicy= disabled on kernel command line. May 17 00:38:59.436692 systemd-networkd[1517]: cali5ec59c6bf6e: Link UP May 17 00:38:59.439963 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:38:59.440066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready May 17 00:38:59.438623 systemd-networkd[1517]: cali5ec59c6bf6e: Gained carrier May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.295 [INFO][3951] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.19.224-k8s-test--pod--1-eth0 default 9792ec1e-fb75-4757-b09d-7a380a30f4e8 1487 0 2025-05-17 00:38:31 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.31.19.224 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.296 [INFO][3951] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.322 [INFO][3964] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" HandleID="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Workload="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.322 [INFO][3964] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" HandleID="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Workload="172.31.19.224-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1070), Attrs:map[string]string{"namespace":"default", "node":"172.31.19.224", "pod":"test-pod-1", "timestamp":"2025-05-17 00:38:59.32265605 +0000 UTC"}, Hostname:"172.31.19.224", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.322 [INFO][3964] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.323 [INFO][3964] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.323 [INFO][3964] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.19.224' May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.355 [INFO][3964] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.395 [INFO][3964] ipam/ipam.go 394: Looking up existing affinities for host host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.402 [INFO][3964] ipam/ipam.go 511: Trying affinity for 192.168.108.64/26 host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.405 [INFO][3964] ipam/ipam.go 158: Attempting to load block cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.409 [INFO][3964] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.108.64/26 host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.409 [INFO][3964] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.108.64/26 handle="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.412 [INFO][3964] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8 May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.418 [INFO][3964] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.108.64/26 handle="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.427 [INFO][3964] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.108.68/26] block=192.168.108.64/26 handle="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.428 [INFO][3964] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.108.68/26] handle="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" host="172.31.19.224" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.428 [INFO][3964] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.428 [INFO][3964] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.108.68/26] IPv6=[] ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" HandleID="k8s-pod-network.a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Workload="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.460947 env[1840]: 2025-05-17 00:38:59.429 [INFO][3951] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9792ec1e-fb75-4757-b09d-7a380a30f4e8", ResourceVersion:"1487", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 38, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.108.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:59.462248 env[1840]: 2025-05-17 00:38:59.430 [INFO][3951] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.108.68/32] ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.462248 env[1840]: 2025-05-17 00:38:59.430 [INFO][3951] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.462248 env[1840]: 2025-05-17 00:38:59.447 [INFO][3951] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.462248 env[1840]: 2025-05-17 00:38:59.447 [INFO][3951] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.19.224-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9792ec1e-fb75-4757-b09d-7a380a30f4e8", ResourceVersion:"1487", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 38, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.19.224", ContainerID:"a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.108.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"de:86:ff:2e:d4:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:38:59.462248 env[1840]: 2025-05-17 00:38:59.459 [INFO][3951] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.19.224-k8s-test--pod--1-eth0" May 17 00:38:59.479275 env[1840]: time="2025-05-17T00:38:59.479153406Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:38:59.479706 env[1840]: time="2025-05-17T00:38:59.479502179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:38:59.479706 env[1840]: time="2025-05-17T00:38:59.479551251Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:38:59.480229 env[1840]: time="2025-05-17T00:38:59.480064083Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8 pid=3983 runtime=io.containerd.runc.v2 May 17 00:38:59.501000 audit[3997]: NETFILTER_CFG table=filter:80 family=2 entries=40 op=nft_register_chain pid=3997 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:38:59.501000 audit[3997]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd938802e0 a2=0 a3=7ffd938802cc items=0 ppid=2870 pid=3997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:38:59.501000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:38:59.573161 env[1840]: time="2025-05-17T00:38:59.573114169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9792ec1e-fb75-4757-b09d-7a380a30f4e8,Namespace:default,Attempt:0,} returns sandbox id \"a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8\"" May 17 00:38:59.575268 env[1840]: time="2025-05-17T00:38:59.575232624Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" May 17 00:38:59.876550 kubelet[2266]: E0517 00:38:59.876440 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:38:59.880075 env[1840]: time="2025-05-17T00:38:59.880017606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:59.883676 env[1840]: time="2025-05-17T00:38:59.883632928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:59.886852 env[1840]: time="2025-05-17T00:38:59.886797972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:59.889425 env[1840]: time="2025-05-17T00:38:59.889383790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:beabce8f1782671ba500ddff99dd260fbf9c5ec85fb9c3162e35a3c40bafd023,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:38:59.890462 env[1840]: time="2025-05-17T00:38:59.890420875Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:7e2dd24abce21cd256091445aca4b7eb00774264c2b0a8714701dd7091509efa\"" May 17 00:38:59.893216 env[1840]: time="2025-05-17T00:38:59.893176533Z" level=info msg="CreateContainer within sandbox \"a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8\" for container &ContainerMetadata{Name:test,Attempt:0,}" May 17 00:38:59.917971 env[1840]: time="2025-05-17T00:38:59.917899852Z" level=info msg="CreateContainer within sandbox \"a8014dda579f201033bc62c68803288e10d2b48dce8ad29ed4cad83dfbeee8c8\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"1bfa748a9086bf3176cb1aee902fa4f3c89a3cfe17c7370955bfa00c34737679\"" May 17 00:38:59.918601 env[1840]: time="2025-05-17T00:38:59.918560472Z" level=info msg="StartContainer for \"1bfa748a9086bf3176cb1aee902fa4f3c89a3cfe17c7370955bfa00c34737679\"" May 17 00:38:59.972769 env[1840]: time="2025-05-17T00:38:59.972722279Z" level=info msg="StartContainer for \"1bfa748a9086bf3176cb1aee902fa4f3c89a3cfe17c7370955bfa00c34737679\" returns successfully" May 17 00:39:00.404066 kubelet[2266]: I0517 00:39:00.404016 2266 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=29.086885921 podStartE2EDuration="29.403998648s" podCreationTimestamp="2025-05-17 00:38:31 +0000 UTC" firstStartedPulling="2025-05-17 00:38:59.574600012 +0000 UTC m=+86.391419255" lastFinishedPulling="2025-05-17 00:38:59.891712735 +0000 UTC m=+86.708531982" observedRunningTime="2025-05-17 00:39:00.403682551 +0000 UTC m=+87.220501815" watchObservedRunningTime="2025-05-17 00:39:00.403998648 +0000 UTC m=+87.220817912" May 17 00:39:00.554317 systemd-networkd[1517]: cali5ec59c6bf6e: Gained IPv6LL May 17 00:39:00.876978 kubelet[2266]: E0517 00:39:00.876919 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:01.877880 kubelet[2266]: E0517 00:39:01.877836 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:02.195040 systemd[1]: run-containerd-runc-k8s.io-f8b4770b483b578975fe5add41d1ceda4c9ed01b517b56e3d8bc18c8ae3ea7d5-runc.Il7PI6.mount: Deactivated successfully. May 17 00:39:02.880349 kubelet[2266]: E0517 00:39:02.880295 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:03.880947 kubelet[2266]: E0517 00:39:03.880852 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:04.882061 kubelet[2266]: E0517 00:39:04.882011 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:05.882685 kubelet[2266]: E0517 00:39:05.882651 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:06.883848 kubelet[2266]: E0517 00:39:06.883761 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:07.884549 kubelet[2266]: E0517 00:39:07.884493 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:08.884951 kubelet[2266]: E0517 00:39:08.884891 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:09.886067 kubelet[2266]: E0517 00:39:09.886009 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:10.887022 kubelet[2266]: E0517 00:39:10.886948 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:11.888041 kubelet[2266]: E0517 00:39:11.888000 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:12.889058 kubelet[2266]: E0517 00:39:12.889003 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:13.809173 kubelet[2266]: E0517 00:39:13.809076 2266 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:13.890060 kubelet[2266]: E0517 00:39:13.890002 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:14.891243 kubelet[2266]: E0517 00:39:14.891166 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:15.891707 kubelet[2266]: E0517 00:39:15.891663 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:16.892211 kubelet[2266]: E0517 00:39:16.892061 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:17.893259 kubelet[2266]: E0517 00:39:17.893213 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:18.894194 kubelet[2266]: E0517 00:39:18.894141 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:19.894899 kubelet[2266]: E0517 00:39:19.894821 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:20.895402 kubelet[2266]: E0517 00:39:20.895354 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:21.896497 kubelet[2266]: E0517 00:39:21.896440 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:22.897461 kubelet[2266]: E0517 00:39:22.897387 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:23.898148 kubelet[2266]: E0517 00:39:23.898079 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:24.898943 kubelet[2266]: E0517 00:39:24.898858 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:25.899516 kubelet[2266]: E0517 00:39:25.899465 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:26.763012 kubelet[2266]: E0517 00:39:26.762927 2266 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:39:26.899660 kubelet[2266]: E0517 00:39:26.899615 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:27.900520 kubelet[2266]: E0517 00:39:27.900443 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:28.900827 kubelet[2266]: E0517 00:39:28.900778 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:29.901972 kubelet[2266]: E0517 00:39:29.901897 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:30.902836 kubelet[2266]: E0517 00:39:30.902768 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:31.903761 kubelet[2266]: E0517 00:39:31.903701 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:32.904511 kubelet[2266]: E0517 00:39:32.904452 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:33.809470 kubelet[2266]: E0517 00:39:33.809398 2266 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:33.904711 kubelet[2266]: E0517 00:39:33.904661 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:34.906067 kubelet[2266]: E0517 00:39:34.905619 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:35.906758 kubelet[2266]: E0517 00:39:35.906709 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:36.763309 kubelet[2266]: E0517 00:39:36.763220 2266 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:39:36.907975 kubelet[2266]: E0517 00:39:36.907909 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:37.908557 kubelet[2266]: E0517 00:39:37.908511 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:38.908780 kubelet[2266]: E0517 00:39:38.908699 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:39.909757 kubelet[2266]: E0517 00:39:39.909696 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:40.910935 kubelet[2266]: E0517 00:39:40.910860 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:41.911943 kubelet[2266]: E0517 00:39:41.911884 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:42.912943 kubelet[2266]: E0517 00:39:42.912873 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:43.913191 kubelet[2266]: E0517 00:39:43.913131 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:44.913730 kubelet[2266]: E0517 00:39:44.913678 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:45.914899 kubelet[2266]: E0517 00:39:45.914834 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:46.764093 kubelet[2266]: E0517 00:39:46.764033 2266 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 17 00:39:46.915800 kubelet[2266]: E0517 00:39:46.915745 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:47.828771 kubelet[2266]: E0517 00:39:47.828189 2266 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": unexpected EOF" May 17 00:39:47.838509 kubelet[2266]: E0517 00:39:47.838463 2266 controller.go:195] "Failed to update lease" err="Put \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": read tcp 172.31.19.224:52792->172.31.26.143:6443: read: connection reset by peer" May 17 00:39:47.843135 kubelet[2266]: I0517 00:39:47.838515 2266 controller.go:115] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" May 17 00:39:47.845697 kubelet[2266]: E0517 00:39:47.843899 2266 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": dial tcp 172.31.26.143:6443: connect: connection refused" interval="200ms" May 17 00:39:47.916215 kubelet[2266]: E0517 00:39:47.916172 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:48.047106 kubelet[2266]: E0517 00:39:48.047062 2266 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": dial tcp 172.31.26.143:6443: connect: connection refused" interval="400ms" May 17 00:39:48.449357 kubelet[2266]: E0517 00:39:48.449251 2266 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": dial tcp 172.31.26.143:6443: connect: connection refused" interval="800ms" May 17 00:39:48.917467 kubelet[2266]: E0517 00:39:48.917128 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:49.251190 kubelet[2266]: E0517 00:39:49.251137 2266 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": dial tcp 172.31.26.143:6443: connect: connection refused" interval="1.6s" May 17 00:39:49.918173 kubelet[2266]: E0517 00:39:49.918129 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:50.852379 kubelet[2266]: E0517 00:39:50.852337 2266 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.26.143:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.19.224?timeout=10s\": dial tcp 172.31.26.143:6443: connect: connection refused" interval="3.2s" May 17 00:39:50.918278 kubelet[2266]: E0517 00:39:50.918228 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" May 17 00:39:51.918740 kubelet[2266]: E0517 00:39:51.918681 2266 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"