May 10 00:43:50.990771 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:43:50.990804 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:43:50.990824 kernel: BIOS-provided physical RAM map: May 10 00:43:50.990835 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:43:50.990847 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 10 00:43:50.990858 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:43:50.990872 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:43:50.990884 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:43:50.990898 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:43:50.990910 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:43:50.990922 kernel: NX (Execute Disable) protection: active May 10 00:43:50.990934 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:43:50.990946 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:43:50.990958 kernel: extended physical RAM map: May 10 00:43:50.990975 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:43:50.990988 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 10 00:43:50.991001 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 10 00:43:50.991014 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 10 00:43:50.991026 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:43:50.991039 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:43:50.991052 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:43:50.991064 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:43:50.991077 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:43:50.991089 kernel: efi: EFI v2.70 by EDK II May 10 00:43:50.991105 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 10 00:43:50.991118 kernel: SMBIOS 2.7 present. May 10 00:43:50.991130 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 10 00:43:50.991143 kernel: Hypervisor detected: KVM May 10 00:43:50.991155 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:43:50.991168 kernel: kvm-clock: cpu 0, msr 1d196001, primary cpu clock May 10 00:43:50.991181 kernel: kvm-clock: using sched offset of 4267538588 cycles May 10 00:43:50.991194 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:43:50.991207 kernel: tsc: Detected 2499.996 MHz processor May 10 00:43:50.991220 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:43:50.991232 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:43:50.991249 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 10 00:43:50.991262 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:43:50.991274 kernel: Using GB pages for direct mapping May 10 00:43:50.991287 kernel: Secure boot disabled May 10 00:43:50.991318 kernel: ACPI: Early table checksum verification disabled May 10 00:43:50.991337 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 10 00:43:50.991352 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 10 00:43:50.991369 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 10 00:43:50.991383 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 10 00:43:50.991396 kernel: ACPI: FACS 0x00000000789D0000 000040 May 10 00:43:50.991411 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 10 00:43:50.991425 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 10 00:43:50.991439 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 10 00:43:50.991453 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 10 00:43:50.991470 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 10 00:43:50.991484 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:43:50.991499 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:43:50.991513 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 10 00:43:50.991527 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 10 00:43:50.991541 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 10 00:43:50.991555 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 10 00:43:50.991569 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 10 00:43:50.991583 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 10 00:43:50.991600 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 10 00:43:50.991614 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 10 00:43:50.991627 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 10 00:43:50.991642 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 10 00:43:50.991656 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 10 00:43:50.991670 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 10 00:43:50.991684 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:43:50.991697 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:43:50.991711 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 10 00:43:50.991728 kernel: NUMA: Initialized distance table, cnt=1 May 10 00:43:50.991742 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 10 00:43:50.991756 kernel: Zone ranges: May 10 00:43:50.991770 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:43:50.991784 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 10 00:43:50.991798 kernel: Normal empty May 10 00:43:50.991812 kernel: Movable zone start for each node May 10 00:43:50.991826 kernel: Early memory node ranges May 10 00:43:50.991840 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:43:50.991857 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 10 00:43:50.991870 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 10 00:43:50.991884 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 10 00:43:50.991898 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:43:50.991913 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:43:50.991926 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:43:50.991941 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 10 00:43:50.991954 kernel: ACPI: PM-Timer IO Port: 0xb008 May 10 00:43:50.991969 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:43:50.991986 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 10 00:43:50.992001 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:43:50.992015 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:43:50.992029 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:43:50.992043 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:43:50.992057 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:43:50.992071 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:43:50.992085 kernel: TSC deadline timer available May 10 00:43:50.992099 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:43:50.992115 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 10 00:43:50.992130 kernel: Booting paravirtualized kernel on KVM May 10 00:43:50.992144 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:43:50.992158 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:43:50.992172 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:43:50.992186 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:43:50.992200 kernel: pcpu-alloc: [0] 0 1 May 10 00:43:50.992215 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 10 00:43:50.992229 kernel: kvm-guest: PV spinlocks enabled May 10 00:43:50.992246 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:43:50.992261 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 10 00:43:50.992275 kernel: Policy zone: DMA32 May 10 00:43:50.992291 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:43:50.992343 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:43:50.992354 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:43:50.992365 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:43:50.992376 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:43:50.992394 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 160904K reserved, 0K cma-reserved) May 10 00:43:50.992409 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:43:50.992423 kernel: Kernel/User page tables isolation: enabled May 10 00:43:50.992437 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:43:50.992451 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:43:50.992465 kernel: rcu: Hierarchical RCU implementation. May 10 00:43:50.992481 kernel: rcu: RCU event tracing is enabled. May 10 00:43:50.992508 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:43:50.992523 kernel: Rude variant of Tasks RCU enabled. May 10 00:43:50.992538 kernel: Tracing variant of Tasks RCU enabled. May 10 00:43:50.992553 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:43:50.992568 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:43:50.992585 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:43:50.992600 kernel: random: crng init done May 10 00:43:50.992615 kernel: Console: colour dummy device 80x25 May 10 00:43:50.992630 kernel: printk: console [tty0] enabled May 10 00:43:50.992645 kernel: printk: console [ttyS0] enabled May 10 00:43:50.992660 kernel: ACPI: Core revision 20210730 May 10 00:43:50.992675 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 10 00:43:50.992693 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:43:50.992708 kernel: x2apic enabled May 10 00:43:50.992724 kernel: Switched APIC routing to physical x2apic. May 10 00:43:50.992739 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns May 10 00:43:50.992754 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) May 10 00:43:50.992769 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:43:50.992785 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:43:50.992802 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:43:50.992817 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:43:50.992831 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:43:50.992846 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:43:50.992861 kernel: RETBleed: Vulnerable May 10 00:43:50.992875 kernel: Speculative Store Bypass: Vulnerable May 10 00:43:50.992890 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:43:50.992905 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:43:50.992920 kernel: GDS: Unknown: Dependent on hypervisor status May 10 00:43:50.992934 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:43:50.992949 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:43:50.992966 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:43:50.992981 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 10 00:43:50.992996 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 10 00:43:50.993011 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:43:50.993026 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:43:50.993041 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:43:50.993056 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 10 00:43:50.993071 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:43:50.993086 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 10 00:43:50.993101 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 10 00:43:50.993116 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 10 00:43:50.993133 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 10 00:43:50.993147 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 10 00:43:50.993162 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 10 00:43:50.993178 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 10 00:43:50.993192 kernel: Freeing SMP alternatives memory: 32K May 10 00:43:50.993207 kernel: pid_max: default: 32768 minimum: 301 May 10 00:43:50.993222 kernel: LSM: Security Framework initializing May 10 00:43:50.993237 kernel: SELinux: Initializing. May 10 00:43:50.993252 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:43:50.993267 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:43:50.993282 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:43:50.993318 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:43:50.993330 kernel: signal: max sigframe size: 3632 May 10 00:43:50.993344 kernel: rcu: Hierarchical SRCU implementation. May 10 00:43:50.993357 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:43:50.993372 kernel: smp: Bringing up secondary CPUs ... May 10 00:43:50.993386 kernel: x86: Booting SMP configuration: May 10 00:43:50.993401 kernel: .... node #0, CPUs: #1 May 10 00:43:50.993415 kernel: kvm-clock: cpu 1, msr 1d196041, secondary cpu clock May 10 00:43:50.993430 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 10 00:43:50.993448 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 10 00:43:50.993463 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:43:50.993476 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:43:50.993497 kernel: smpboot: Max logical packages: 1 May 10 00:43:50.993511 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) May 10 00:43:50.993525 kernel: devtmpfs: initialized May 10 00:43:50.993540 kernel: x86/mm: Memory block size: 128MB May 10 00:43:50.993555 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 10 00:43:50.993571 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:43:50.993589 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:43:50.993604 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:43:50.993619 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:43:50.993635 kernel: audit: initializing netlink subsys (disabled) May 10 00:43:50.993650 kernel: audit: type=2000 audit(1746837830.449:1): state=initialized audit_enabled=0 res=1 May 10 00:43:50.993665 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:43:50.993681 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:43:50.993695 kernel: cpuidle: using governor menu May 10 00:43:50.993711 kernel: ACPI: bus type PCI registered May 10 00:43:50.993727 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:43:50.993742 kernel: dca service started, version 1.12.1 May 10 00:43:50.993757 kernel: PCI: Using configuration type 1 for base access May 10 00:43:50.993773 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:43:50.993788 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:43:50.993803 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:43:50.993818 kernel: ACPI: Added _OSI(Module Device) May 10 00:43:50.993833 kernel: ACPI: Added _OSI(Processor Device) May 10 00:43:50.993849 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:43:50.993867 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:43:50.993883 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:43:50.993898 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:43:50.993913 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:43:50.993928 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 10 00:43:50.993943 kernel: ACPI: Interpreter enabled May 10 00:43:50.993957 kernel: ACPI: PM: (supports S0 S5) May 10 00:43:50.993970 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:43:50.993985 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:43:50.994003 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:43:50.994019 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:43:50.994225 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:43:50.994373 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:43:50.994394 kernel: acpiphp: Slot [3] registered May 10 00:43:50.994409 kernel: acpiphp: Slot [4] registered May 10 00:43:50.994424 kernel: acpiphp: Slot [5] registered May 10 00:43:50.994443 kernel: acpiphp: Slot [6] registered May 10 00:43:50.994458 kernel: acpiphp: Slot [7] registered May 10 00:43:50.994473 kernel: acpiphp: Slot [8] registered May 10 00:43:50.994488 kernel: acpiphp: Slot [9] registered May 10 00:43:50.994504 kernel: acpiphp: Slot [10] registered May 10 00:43:50.994519 kernel: acpiphp: Slot [11] registered May 10 00:43:50.994534 kernel: acpiphp: Slot [12] registered May 10 00:43:50.994548 kernel: acpiphp: Slot [13] registered May 10 00:43:50.994564 kernel: acpiphp: Slot [14] registered May 10 00:43:50.994578 kernel: acpiphp: Slot [15] registered May 10 00:43:50.994596 kernel: acpiphp: Slot [16] registered May 10 00:43:50.994611 kernel: acpiphp: Slot [17] registered May 10 00:43:50.994626 kernel: acpiphp: Slot [18] registered May 10 00:43:50.994641 kernel: acpiphp: Slot [19] registered May 10 00:43:50.994654 kernel: acpiphp: Slot [20] registered May 10 00:43:50.994665 kernel: acpiphp: Slot [21] registered May 10 00:43:50.994678 kernel: acpiphp: Slot [22] registered May 10 00:43:50.994689 kernel: acpiphp: Slot [23] registered May 10 00:43:50.994699 kernel: acpiphp: Slot [24] registered May 10 00:43:50.994715 kernel: acpiphp: Slot [25] registered May 10 00:43:50.994728 kernel: acpiphp: Slot [26] registered May 10 00:43:50.994742 kernel: acpiphp: Slot [27] registered May 10 00:43:50.994753 kernel: acpiphp: Slot [28] registered May 10 00:43:51.006442 kernel: acpiphp: Slot [29] registered May 10 00:43:51.006472 kernel: acpiphp: Slot [30] registered May 10 00:43:51.006485 kernel: acpiphp: Slot [31] registered May 10 00:43:51.006497 kernel: PCI host bridge to bus 0000:00 May 10 00:43:51.006692 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:43:51.006820 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:43:51.006938 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:43:51.007050 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:43:51.007163 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 10 00:43:51.007273 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:43:51.007449 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:43:51.007590 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:43:51.007737 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 10 00:43:51.007867 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 10 00:43:51.007996 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 10 00:43:51.008123 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 10 00:43:51.008251 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 10 00:43:51.008400 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 10 00:43:51.008538 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 10 00:43:51.008666 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 10 00:43:51.008802 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 10 00:43:51.008933 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 10 00:43:51.009061 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:43:51.009184 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 10 00:43:51.009324 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:43:51.009466 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 10 00:43:51.009605 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 10 00:43:51.009738 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 10 00:43:51.009860 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 10 00:43:51.009879 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:43:51.009895 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:43:51.009910 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:43:51.009929 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:43:51.009944 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:43:51.009960 kernel: iommu: Default domain type: Translated May 10 00:43:51.009975 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:43:51.010100 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 10 00:43:51.010229 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:43:51.014700 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 10 00:43:51.014745 kernel: vgaarb: loaded May 10 00:43:51.014762 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:43:51.014785 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:43:51.014801 kernel: PTP clock support registered May 10 00:43:51.014816 kernel: Registered efivars operations May 10 00:43:51.014831 kernel: PCI: Using ACPI for IRQ routing May 10 00:43:51.014848 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:43:51.014863 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 10 00:43:51.014879 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 10 00:43:51.014894 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 10 00:43:51.014908 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 10 00:43:51.014926 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 10 00:43:51.014941 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:43:51.014956 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:43:51.014972 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:43:51.014986 kernel: pnp: PnP ACPI init May 10 00:43:51.015002 kernel: pnp: PnP ACPI: found 5 devices May 10 00:43:51.015018 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:43:51.015033 kernel: NET: Registered PF_INET protocol family May 10 00:43:51.015048 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:43:51.015065 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:43:51.015081 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:43:51.015097 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:43:51.015112 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:43:51.015127 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:43:51.015142 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:43:51.015157 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:43:51.015173 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:43:51.015190 kernel: NET: Registered PF_XDP protocol family May 10 00:43:51.015338 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:43:51.015457 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:43:51.015571 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:43:51.015682 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:43:51.015795 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 10 00:43:51.015930 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:43:51.016062 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:43:51.016086 kernel: PCI: CLS 0 bytes, default 64 May 10 00:43:51.016103 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:43:51.016119 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns May 10 00:43:51.016134 kernel: clocksource: Switched to clocksource tsc May 10 00:43:51.016149 kernel: Initialise system trusted keyrings May 10 00:43:51.016164 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:43:51.016180 kernel: Key type asymmetric registered May 10 00:43:51.016195 kernel: Asymmetric key parser 'x509' registered May 10 00:43:51.016210 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:43:51.016228 kernel: io scheduler mq-deadline registered May 10 00:43:51.016244 kernel: io scheduler kyber registered May 10 00:43:51.016259 kernel: io scheduler bfq registered May 10 00:43:51.016275 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:43:51.016290 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:43:51.016318 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:43:51.016333 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:43:51.016349 kernel: i8042: Warning: Keylock active May 10 00:43:51.016363 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:43:51.016382 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:43:51.016526 kernel: rtc_cmos 00:00: RTC can wake from S4 May 10 00:43:51.016644 kernel: rtc_cmos 00:00: registered as rtc0 May 10 00:43:51.016758 kernel: rtc_cmos 00:00: setting system clock to 2025-05-10T00:43:50 UTC (1746837830) May 10 00:43:51.016868 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 10 00:43:51.016887 kernel: intel_pstate: CPU model not supported May 10 00:43:51.016902 kernel: efifb: probing for efifb May 10 00:43:51.016917 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 10 00:43:51.016936 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 10 00:43:51.016950 kernel: efifb: scrolling: redraw May 10 00:43:51.016964 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:43:51.016978 kernel: Console: switching to colour frame buffer device 100x37 May 10 00:43:51.016992 kernel: fb0: EFI VGA frame buffer device May 10 00:43:51.017006 kernel: pstore: Registered efi as persistent store backend May 10 00:43:51.017045 kernel: NET: Registered PF_INET6 protocol family May 10 00:43:51.017064 kernel: Segment Routing with IPv6 May 10 00:43:51.017080 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:43:51.017098 kernel: NET: Registered PF_PACKET protocol family May 10 00:43:51.017115 kernel: Key type dns_resolver registered May 10 00:43:51.017130 kernel: IPI shorthand broadcast: enabled May 10 00:43:51.017146 kernel: sched_clock: Marking stable (352134938, 152302481)->(592313558, -87876139) May 10 00:43:51.017162 kernel: registered taskstats version 1 May 10 00:43:51.017178 kernel: Loading compiled-in X.509 certificates May 10 00:43:51.017194 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:43:51.017210 kernel: Key type .fscrypt registered May 10 00:43:51.017227 kernel: Key type fscrypt-provisioning registered May 10 00:43:51.017245 kernel: pstore: Using crash dump compression: deflate May 10 00:43:51.017261 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:43:51.017277 kernel: ima: Allocated hash algorithm: sha1 May 10 00:43:51.017293 kernel: ima: No architecture policies found May 10 00:43:51.017328 kernel: clk: Disabling unused clocks May 10 00:43:51.017344 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:43:51.017360 kernel: Write protecting the kernel read-only data: 28672k May 10 00:43:51.017376 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:43:51.017392 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:43:51.017411 kernel: Run /init as init process May 10 00:43:51.017427 kernel: with arguments: May 10 00:43:51.017443 kernel: /init May 10 00:43:51.017458 kernel: with environment: May 10 00:43:51.017474 kernel: HOME=/ May 10 00:43:51.017500 kernel: TERM=linux May 10 00:43:51.017516 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:43:51.017535 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:43:51.017558 systemd[1]: Detected virtualization amazon. May 10 00:43:51.017575 systemd[1]: Detected architecture x86-64. May 10 00:43:51.017591 systemd[1]: Running in initrd. May 10 00:43:51.017607 systemd[1]: No hostname configured, using default hostname. May 10 00:43:51.017623 systemd[1]: Hostname set to . May 10 00:43:51.017641 systemd[1]: Initializing machine ID from VM UUID. May 10 00:43:51.017657 systemd[1]: Queued start job for default target initrd.target. May 10 00:43:51.017674 systemd[1]: Started systemd-ask-password-console.path. May 10 00:43:51.017695 systemd[1]: Reached target cryptsetup.target. May 10 00:43:51.017711 systemd[1]: Reached target paths.target. May 10 00:43:51.017728 systemd[1]: Reached target slices.target. May 10 00:43:51.017744 systemd[1]: Reached target swap.target. May 10 00:43:51.017759 systemd[1]: Reached target timers.target. May 10 00:43:51.017779 systemd[1]: Listening on iscsid.socket. May 10 00:43:51.017797 systemd[1]: Listening on iscsiuio.socket. May 10 00:43:51.017814 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:43:51.017830 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:43:51.017847 systemd[1]: Listening on systemd-journald.socket. May 10 00:43:51.017864 systemd[1]: Listening on systemd-networkd.socket. May 10 00:43:51.017880 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:43:51.017897 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:43:51.017917 systemd[1]: Reached target sockets.target. May 10 00:43:51.017934 systemd[1]: Starting kmod-static-nodes.service... May 10 00:43:51.017951 systemd[1]: Finished network-cleanup.service. May 10 00:43:51.017968 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:43:51.017984 systemd[1]: Starting systemd-journald.service... May 10 00:43:51.018000 systemd[1]: Starting systemd-modules-load.service... May 10 00:43:51.018017 systemd[1]: Starting systemd-resolved.service... May 10 00:43:51.018033 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:43:51.018050 systemd[1]: Finished kmod-static-nodes.service. May 10 00:43:51.018069 kernel: audit: type=1130 audit(1746837830.993:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.018085 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:43:51.018102 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:43:51.018124 systemd-journald[185]: Journal started May 10 00:43:51.018206 systemd-journald[185]: Runtime Journal (/run/log/journal/ec297bd8de5f101186ced84e711b5f55) is 4.8M, max 38.3M, 33.5M free. May 10 00:43:50.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.010427 systemd-modules-load[186]: Inserted module 'overlay' May 10 00:43:51.029385 kernel: audit: type=1130 audit(1746837831.017:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.029417 systemd[1]: Started systemd-journald.service. May 10 00:43:51.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.038404 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:43:51.043720 kernel: audit: type=1130 audit(1746837831.029:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.043709 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:43:51.065432 kernel: audit: type=1130 audit(1746837831.041:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.048635 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:43:51.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.073625 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:43:51.085858 kernel: audit: type=1130 audit(1746837831.073:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.090075 systemd-resolved[187]: Positive Trust Anchors: May 10 00:43:51.090091 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:43:51.103384 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:43:51.103420 kernel: audit: type=1130 audit(1746837831.096:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.090145 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:43:51.145981 kernel: Bridge firewalling registered May 10 00:43:51.146017 kernel: audit: type=1130 audit(1746837831.109:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.146040 kernel: SCSI subsystem initialized May 10 00:43:51.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.094284 systemd-resolved[187]: Defaulting to hostname 'linux'. May 10 00:43:51.094657 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:43:51.150947 dracut-cmdline[201]: dracut-dracut-053 May 10 00:43:51.097508 systemd[1]: Started systemd-resolved.service. May 10 00:43:51.110784 systemd[1]: Reached target nss-lookup.target. May 10 00:43:51.111180 systemd-modules-load[186]: Inserted module 'br_netfilter' May 10 00:43:51.120485 systemd[1]: Starting dracut-cmdline.service... May 10 00:43:51.168741 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:43:51.168776 kernel: device-mapper: uevent: version 1.0.3 May 10 00:43:51.168795 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:43:51.168815 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:43:51.187481 kernel: audit: type=1130 audit(1746837831.168:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.166120 systemd-modules-load[186]: Inserted module 'dm_multipath' May 10 00:43:51.166999 systemd[1]: Finished systemd-modules-load.service. May 10 00:43:51.171027 systemd[1]: Starting systemd-sysctl.service... May 10 00:43:51.193400 systemd[1]: Finished systemd-sysctl.service. May 10 00:43:51.203601 kernel: audit: type=1130 audit(1746837831.193:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.242326 kernel: Loading iSCSI transport class v2.0-870. May 10 00:43:51.261325 kernel: iscsi: registered transport (tcp) May 10 00:43:51.286986 kernel: iscsi: registered transport (qla4xxx) May 10 00:43:51.287058 kernel: QLogic iSCSI HBA Driver May 10 00:43:51.318648 systemd[1]: Finished dracut-cmdline.service. May 10 00:43:51.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.320708 systemd[1]: Starting dracut-pre-udev.service... May 10 00:43:51.372356 kernel: raid6: avx512x4 gen() 18060 MB/s May 10 00:43:51.390346 kernel: raid6: avx512x4 xor() 7565 MB/s May 10 00:43:51.408347 kernel: raid6: avx512x2 gen() 17966 MB/s May 10 00:43:51.426353 kernel: raid6: avx512x2 xor() 24195 MB/s May 10 00:43:51.444348 kernel: raid6: avx512x1 gen() 18016 MB/s May 10 00:43:51.462341 kernel: raid6: avx512x1 xor() 22003 MB/s May 10 00:43:51.480335 kernel: raid6: avx2x4 gen() 17934 MB/s May 10 00:43:51.498330 kernel: raid6: avx2x4 xor() 7590 MB/s May 10 00:43:51.516341 kernel: raid6: avx2x2 gen() 17969 MB/s May 10 00:43:51.534331 kernel: raid6: avx2x2 xor() 18220 MB/s May 10 00:43:51.552323 kernel: raid6: avx2x1 gen() 13666 MB/s May 10 00:43:51.570323 kernel: raid6: avx2x1 xor() 15779 MB/s May 10 00:43:51.588323 kernel: raid6: sse2x4 gen() 9544 MB/s May 10 00:43:51.606322 kernel: raid6: sse2x4 xor() 6016 MB/s May 10 00:43:51.624320 kernel: raid6: sse2x2 gen() 10574 MB/s May 10 00:43:51.642322 kernel: raid6: sse2x2 xor() 6299 MB/s May 10 00:43:51.660320 kernel: raid6: sse2x1 gen() 9465 MB/s May 10 00:43:51.678806 kernel: raid6: sse2x1 xor() 4864 MB/s May 10 00:43:51.678858 kernel: raid6: using algorithm avx512x4 gen() 18060 MB/s May 10 00:43:51.678877 kernel: raid6: .... xor() 7565 MB/s, rmw enabled May 10 00:43:51.680051 kernel: raid6: using avx512x2 recovery algorithm May 10 00:43:51.694324 kernel: xor: automatically using best checksumming function avx May 10 00:43:51.796329 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:43:51.805009 systemd[1]: Finished dracut-pre-udev.service. May 10 00:43:51.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.804000 audit: BPF prog-id=7 op=LOAD May 10 00:43:51.804000 audit: BPF prog-id=8 op=LOAD May 10 00:43:51.806682 systemd[1]: Starting systemd-udevd.service... May 10 00:43:51.820071 systemd-udevd[383]: Using default interface naming scheme 'v252'. May 10 00:43:51.825363 systemd[1]: Started systemd-udevd.service. May 10 00:43:51.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.831377 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:43:51.848165 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation May 10 00:43:51.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.879317 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:43:51.880602 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:43:51.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:51.922190 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:43:51.992118 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 10 00:43:52.019277 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 10 00:43:52.019470 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:43:52.019489 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 10 00:43:52.019628 kernel: nvme nvme0: pci function 0000:00:04.0 May 10 00:43:52.019802 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:43:52.019823 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:e6:5f:e6:36:29 May 10 00:43:52.024317 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 10 00:43:52.034911 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:43:52.034983 kernel: GPT:9289727 != 16777215 May 10 00:43:52.035002 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:43:52.038551 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:43:52.038615 kernel: GPT:9289727 != 16777215 May 10 00:43:52.040058 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:43:52.044859 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:43:52.044925 kernel: AES CTR mode by8 optimization enabled May 10 00:43:52.048753 (udev-worker)[430]: Network interface NamePolicy= disabled on kernel command line. May 10 00:43:52.125327 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (431) May 10 00:43:52.143319 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:43:52.174289 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:43:52.179771 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:43:52.185501 systemd[1]: Starting disk-uuid.service... May 10 00:43:52.191945 disk-uuid[590]: Primary Header is updated. May 10 00:43:52.191945 disk-uuid[590]: Secondary Entries is updated. May 10 00:43:52.191945 disk-uuid[590]: Secondary Header is updated. May 10 00:43:52.212359 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:43:52.224493 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:43:53.210317 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:43:53.210604 disk-uuid[591]: The operation has completed successfully. May 10 00:43:53.337957 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:43:53.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.338069 systemd[1]: Finished disk-uuid.service. May 10 00:43:53.345222 systemd[1]: Starting verity-setup.service... May 10 00:43:53.375335 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:43:53.490376 systemd[1]: Found device dev-mapper-usr.device. May 10 00:43:53.493113 systemd[1]: Mounting sysusr-usr.mount... May 10 00:43:53.498462 systemd[1]: Finished verity-setup.service. May 10 00:43:53.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.587323 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:43:53.588112 systemd[1]: Mounted sysusr-usr.mount. May 10 00:43:53.588998 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:43:53.589814 systemd[1]: Starting ignition-setup.service... May 10 00:43:53.592903 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:43:53.622471 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:43:53.622532 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:43:53.622545 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:43:53.644327 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:43:53.655546 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:43:53.669142 systemd[1]: Finished ignition-setup.service. May 10 00:43:53.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.670681 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:43:53.676858 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:43:53.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.677000 audit: BPF prog-id=9 op=LOAD May 10 00:43:53.679110 systemd[1]: Starting systemd-networkd.service... May 10 00:43:53.701420 systemd-networkd[937]: lo: Link UP May 10 00:43:53.701431 systemd-networkd[937]: lo: Gained carrier May 10 00:43:53.702220 systemd-networkd[937]: Enumeration completed May 10 00:43:53.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.702385 systemd[1]: Started systemd-networkd.service. May 10 00:43:53.702733 systemd-networkd[937]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:43:53.705235 systemd[1]: Reached target network.target. May 10 00:43:53.707575 systemd-networkd[937]: eth0: Link UP May 10 00:43:53.707581 systemd-networkd[937]: eth0: Gained carrier May 10 00:43:53.710924 systemd[1]: Starting iscsiuio.service... May 10 00:43:53.717054 systemd[1]: Started iscsiuio.service. May 10 00:43:53.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.719181 systemd[1]: Starting iscsid.service... May 10 00:43:53.721606 systemd-networkd[937]: eth0: DHCPv4 address 172.31.18.109/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:43:53.723152 iscsid[943]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:43:53.723152 iscsid[943]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:43:53.723152 iscsid[943]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:43:53.723152 iscsid[943]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:43:53.723152 iscsid[943]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:43:53.723152 iscsid[943]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:43:53.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.724331 systemd[1]: Started iscsid.service. May 10 00:43:53.726476 systemd[1]: Starting dracut-initqueue.service... May 10 00:43:53.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:53.739536 systemd[1]: Finished dracut-initqueue.service. May 10 00:43:53.740357 systemd[1]: Reached target remote-fs-pre.target. May 10 00:43:53.741024 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:43:53.741769 systemd[1]: Reached target remote-fs.target. May 10 00:43:53.743164 systemd[1]: Starting dracut-pre-mount.service... May 10 00:43:53.752253 systemd[1]: Finished dracut-pre-mount.service. May 10 00:43:53.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.060719 ignition[934]: Ignition 2.14.0 May 10 00:43:54.060732 ignition[934]: Stage: fetch-offline May 10 00:43:54.060845 ignition[934]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:54.060876 ignition[934]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:54.081057 ignition[934]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:54.081831 ignition[934]: Ignition finished successfully May 10 00:43:54.083792 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:43:54.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.085804 systemd[1]: Starting ignition-fetch.service... May 10 00:43:54.095233 ignition[962]: Ignition 2.14.0 May 10 00:43:54.095245 ignition[962]: Stage: fetch May 10 00:43:54.095448 ignition[962]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:54.095480 ignition[962]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:54.103346 ignition[962]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:54.104048 ignition[962]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:54.114087 ignition[962]: INFO : PUT result: OK May 10 00:43:54.115569 ignition[962]: DEBUG : parsed url from cmdline: "" May 10 00:43:54.115569 ignition[962]: INFO : no config URL provided May 10 00:43:54.115569 ignition[962]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 10 00:43:54.115569 ignition[962]: INFO : no config at "/usr/lib/ignition/user.ign" May 10 00:43:54.118062 ignition[962]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:54.118062 ignition[962]: INFO : PUT result: OK May 10 00:43:54.118062 ignition[962]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 10 00:43:54.118062 ignition[962]: INFO : GET result: OK May 10 00:43:54.118062 ignition[962]: DEBUG : parsing config with SHA512: e92b1e1370ee261d23072ef52e590b9304941b70e7d6dc85408cbe361795123c80c2572859d2f43e3d2777f357138b97bdbf3abd283f793c8d681953f5fdc434 May 10 00:43:54.122561 unknown[962]: fetched base config from "system" May 10 00:43:54.122575 unknown[962]: fetched base config from "system" May 10 00:43:54.123130 ignition[962]: fetch: fetch complete May 10 00:43:54.122582 unknown[962]: fetched user config from "aws" May 10 00:43:54.123135 ignition[962]: fetch: fetch passed May 10 00:43:54.123177 ignition[962]: Ignition finished successfully May 10 00:43:54.127226 systemd[1]: Finished ignition-fetch.service. May 10 00:43:54.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.128731 systemd[1]: Starting ignition-kargs.service... May 10 00:43:54.138550 ignition[968]: Ignition 2.14.0 May 10 00:43:54.139352 ignition[968]: Stage: kargs May 10 00:43:54.139531 ignition[968]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:54.139558 ignition[968]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:54.145838 ignition[968]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:54.146625 ignition[968]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:54.147276 ignition[968]: INFO : PUT result: OK May 10 00:43:54.149102 ignition[968]: kargs: kargs passed May 10 00:43:54.149156 ignition[968]: Ignition finished successfully May 10 00:43:54.151250 systemd[1]: Finished ignition-kargs.service. May 10 00:43:54.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.152734 systemd[1]: Starting ignition-disks.service... May 10 00:43:54.160819 ignition[974]: Ignition 2.14.0 May 10 00:43:54.160832 ignition[974]: Stage: disks May 10 00:43:54.161038 ignition[974]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:54.161071 ignition[974]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:54.168882 ignition[974]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:54.169868 ignition[974]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:54.171092 ignition[974]: INFO : PUT result: OK May 10 00:43:54.173747 ignition[974]: disks: disks passed May 10 00:43:54.173815 ignition[974]: Ignition finished successfully May 10 00:43:54.175707 systemd[1]: Finished ignition-disks.service. May 10 00:43:54.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.176471 systemd[1]: Reached target initrd-root-device.target. May 10 00:43:54.177656 systemd[1]: Reached target local-fs-pre.target. May 10 00:43:54.178743 systemd[1]: Reached target local-fs.target. May 10 00:43:54.179818 systemd[1]: Reached target sysinit.target. May 10 00:43:54.180903 systemd[1]: Reached target basic.target. May 10 00:43:54.183257 systemd[1]: Starting systemd-fsck-root.service... May 10 00:43:54.228596 systemd-fsck[982]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:43:54.231578 systemd[1]: Finished systemd-fsck-root.service. May 10 00:43:54.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.233377 systemd[1]: Mounting sysroot.mount... May 10 00:43:54.261325 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:43:54.262653 systemd[1]: Mounted sysroot.mount. May 10 00:43:54.263930 systemd[1]: Reached target initrd-root-fs.target. May 10 00:43:54.273894 systemd[1]: Mounting sysroot-usr.mount... May 10 00:43:54.275045 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:43:54.275088 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:43:54.275115 systemd[1]: Reached target ignition-diskful.target. May 10 00:43:54.277414 systemd[1]: Mounted sysroot-usr.mount. May 10 00:43:54.281014 systemd[1]: Starting initrd-setup-root.service... May 10 00:43:54.294127 initrd-setup-root[1003]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:43:54.301039 initrd-setup-root[1011]: cut: /sysroot/etc/group: No such file or directory May 10 00:43:54.306281 initrd-setup-root[1019]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:43:54.311909 initrd-setup-root[1027]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:43:54.411319 systemd[1]: Finished initrd-setup-root.service. May 10 00:43:54.412829 systemd[1]: Starting ignition-mount.service... May 10 00:43:54.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.414339 systemd[1]: Starting sysroot-boot.service... May 10 00:43:54.421089 bash[1044]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:43:54.430049 ignition[1045]: INFO : Ignition 2.14.0 May 10 00:43:54.430049 ignition[1045]: INFO : Stage: mount May 10 00:43:54.431625 ignition[1045]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:54.431625 ignition[1045]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:54.442545 ignition[1045]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:54.443493 ignition[1045]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:54.446809 ignition[1045]: INFO : PUT result: OK May 10 00:43:54.449823 ignition[1045]: INFO : mount: mount passed May 10 00:43:54.450533 ignition[1045]: INFO : Ignition finished successfully May 10 00:43:54.450637 systemd[1]: Finished ignition-mount.service. May 10 00:43:54.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:54.458141 systemd[1]: Finished sysroot-boot.service. May 10 00:43:54.523148 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:43:54.548317 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1054) May 10 00:43:54.552323 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:43:54.552381 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:43:54.552393 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:43:54.564321 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:43:54.567796 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:43:54.569693 systemd[1]: Starting ignition-files.service... May 10 00:43:54.587472 ignition[1074]: INFO : Ignition 2.14.0 May 10 00:43:54.587472 ignition[1074]: INFO : Stage: files May 10 00:43:54.590366 ignition[1074]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:54.590366 ignition[1074]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:54.597045 ignition[1074]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:54.598114 ignition[1074]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:54.599095 ignition[1074]: INFO : PUT result: OK May 10 00:43:54.602588 ignition[1074]: DEBUG : files: compiled without relabeling support, skipping May 10 00:43:54.607541 ignition[1074]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:43:54.608812 ignition[1074]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:43:54.615686 ignition[1074]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:43:54.617333 ignition[1074]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:43:54.620945 unknown[1074]: wrote ssh authorized keys file for user: core May 10 00:43:54.621974 ignition[1074]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:43:54.630458 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:43:54.631949 ignition[1074]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:43:54.716228 ignition[1074]: INFO : GET result: OK May 10 00:43:54.927168 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:43:54.927168 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:43:54.930598 ignition[1074]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:43:54.933070 ignition[1074]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1537372516" May 10 00:43:54.934785 ignition[1074]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1537372516": device or resource busy May 10 00:43:54.934785 ignition[1074]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1537372516", trying btrfs: device or resource busy May 10 00:43:54.934785 ignition[1074]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1537372516" May 10 00:43:54.939670 ignition[1074]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1537372516" May 10 00:43:54.939670 ignition[1074]: INFO : op(3): [started] unmounting "/mnt/oem1537372516" May 10 00:43:54.942417 ignition[1074]: INFO : op(3): [finished] unmounting "/mnt/oem1537372516" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:43:54.942417 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:43:54.940084 systemd[1]: mnt-oem1537372516.mount: Deactivated successfully. May 10 00:43:54.956997 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:43:54.956997 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:43:54.956997 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:43:54.956997 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:54.956997 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:54.956997 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:43:54.956997 ignition[1074]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:43:54.956997 ignition[1074]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1096675724" May 10 00:43:54.956997 ignition[1074]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1096675724": device or resource busy May 10 00:43:54.956997 ignition[1074]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1096675724", trying btrfs: device or resource busy May 10 00:43:54.956997 ignition[1074]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1096675724" May 10 00:43:54.977902 ignition[1074]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1096675724" May 10 00:43:54.977902 ignition[1074]: INFO : op(6): [started] unmounting "/mnt/oem1096675724" May 10 00:43:54.977902 ignition[1074]: INFO : op(6): [finished] unmounting "/mnt/oem1096675724" May 10 00:43:54.977902 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:43:54.977902 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:43:54.977902 ignition[1074]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:43:54.977902 ignition[1074]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3498986935" May 10 00:43:54.977902 ignition[1074]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3498986935": device or resource busy May 10 00:43:54.977902 ignition[1074]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3498986935", trying btrfs: device or resource busy May 10 00:43:54.977902 ignition[1074]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3498986935" May 10 00:43:54.977902 ignition[1074]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3498986935" May 10 00:43:54.977902 ignition[1074]: INFO : op(9): [started] unmounting "/mnt/oem3498986935" May 10 00:43:54.977902 ignition[1074]: INFO : op(9): [finished] unmounting "/mnt/oem3498986935" May 10 00:43:54.977902 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:43:54.977902 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:43:54.977902 ignition[1074]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:43:55.001024 ignition[1074]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1076040567" May 10 00:43:55.001024 ignition[1074]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1076040567": device or resource busy May 10 00:43:55.001024 ignition[1074]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1076040567", trying btrfs: device or resource busy May 10 00:43:55.001024 ignition[1074]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1076040567" May 10 00:43:55.001024 ignition[1074]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1076040567" May 10 00:43:55.001024 ignition[1074]: INFO : op(c): [started] unmounting "/mnt/oem1076040567" May 10 00:43:55.001024 ignition[1074]: INFO : op(c): [finished] unmounting "/mnt/oem1076040567" May 10 00:43:55.001024 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:43:55.001024 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:55.001024 ignition[1074]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:43:55.440200 ignition[1074]: INFO : GET result: OK May 10 00:43:55.521614 systemd[1]: mnt-oem1096675724.mount: Deactivated successfully. May 10 00:43:55.616443 systemd-networkd[937]: eth0: Gained IPv6LL May 10 00:43:55.800085 ignition[1074]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:43:55.800085 ignition[1074]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:43:55.800085 ignition[1074]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:43:55.800085 ignition[1074]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(12): [started] processing unit "nvidia.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(12): [finished] processing unit "nvidia.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(13): [started] processing unit "prepare-helm.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(15): [started] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(15): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:43:55.812381 ignition[1074]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:43:55.812381 ignition[1074]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:43:55.812381 ignition[1074]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:43:55.812381 ignition[1074]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:43:55.812381 ignition[1074]: INFO : files: files passed May 10 00:43:55.812381 ignition[1074]: INFO : Ignition finished successfully May 10 00:43:55.933131 kernel: kauditd_printk_skb: 26 callbacks suppressed May 10 00:43:55.933174 kernel: audit: type=1130 audit(1746837835.812:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.933196 kernel: audit: type=1130 audit(1746837835.836:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.933216 kernel: audit: type=1131 audit(1746837835.836:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.933235 kernel: audit: type=1130 audit(1746837835.849:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.933256 kernel: audit: type=1130 audit(1746837835.882:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.933275 kernel: audit: type=1131 audit(1746837835.883:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.933309 kernel: audit: type=1130 audit(1746837835.920:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.810659 systemd[1]: Finished ignition-files.service. May 10 00:43:55.822614 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:43:55.829102 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:43:55.940770 initrd-setup-root-after-ignition[1099]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:43:55.830375 systemd[1]: Starting ignition-quench.service... May 10 00:43:55.955905 kernel: audit: type=1130 audit(1746837835.943:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.955944 kernel: audit: type=1131 audit(1746837835.943:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.835089 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:43:55.835222 systemd[1]: Finished ignition-quench.service. May 10 00:43:55.838216 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:43:55.851322 systemd[1]: Reached target ignition-complete.target. May 10 00:43:55.968007 kernel: audit: type=1131 audit(1746837835.960:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.860660 systemd[1]: Starting initrd-parse-etc.service... May 10 00:43:55.882850 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:43:55.882984 systemd[1]: Finished initrd-parse-etc.service. May 10 00:43:55.884474 systemd[1]: Reached target initrd-fs.target. May 10 00:43:55.897769 systemd[1]: Reached target initrd.target. May 10 00:43:55.900650 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:43:55.902038 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:43:55.919231 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:43:55.922931 systemd[1]: Starting initrd-cleanup.service... May 10 00:43:55.943079 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:43:55.943207 systemd[1]: Finished initrd-cleanup.service. May 10 00:43:55.945937 systemd[1]: Stopped target nss-lookup.target. May 10 00:43:55.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.956882 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:43:55.958683 systemd[1]: Stopped target timers.target. May 10 00:43:55.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.960436 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:43:55.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.960512 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:43:55.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.962231 systemd[1]: Stopped target initrd.target. May 10 00:43:55.968908 systemd[1]: Stopped target basic.target. May 10 00:43:56.011335 iscsid[943]: iscsid shutting down. May 10 00:43:55.970575 systemd[1]: Stopped target ignition-complete.target. May 10 00:43:56.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.017280 ignition[1112]: INFO : Ignition 2.14.0 May 10 00:43:56.017280 ignition[1112]: INFO : Stage: umount May 10 00:43:56.017280 ignition[1112]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:43:56.017280 ignition[1112]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:43:56.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.972089 systemd[1]: Stopped target ignition-diskful.target. May 10 00:43:56.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.973690 systemd[1]: Stopped target initrd-root-device.target. May 10 00:43:55.975141 systemd[1]: Stopped target remote-fs.target. May 10 00:43:55.976592 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:43:55.978851 systemd[1]: Stopped target sysinit.target. May 10 00:43:55.980271 systemd[1]: Stopped target local-fs.target. May 10 00:43:56.039150 ignition[1112]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:43:55.981775 systemd[1]: Stopped target local-fs-pre.target. May 10 00:43:56.043676 ignition[1112]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:43:56.043676 ignition[1112]: INFO : PUT result: OK May 10 00:43:55.983174 systemd[1]: Stopped target swap.target. May 10 00:43:56.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.047946 ignition[1112]: INFO : umount: umount passed May 10 00:43:56.047946 ignition[1112]: INFO : Ignition finished successfully May 10 00:43:56.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.984569 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:43:56.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.984661 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:43:55.986097 systemd[1]: Stopped target cryptsetup.target. May 10 00:43:56.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:55.987443 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:43:55.987517 systemd[1]: Stopped dracut-initqueue.service. May 10 00:43:55.988924 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:43:55.988987 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:43:55.990420 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:43:55.990484 systemd[1]: Stopped ignition-files.service. May 10 00:43:55.992847 systemd[1]: Stopping ignition-mount.service... May 10 00:43:55.993944 systemd[1]: Stopping iscsid.service... May 10 00:43:56.005424 systemd[1]: Stopping sysroot-boot.service... May 10 00:43:56.012125 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:43:56.012215 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:43:56.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.014149 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:43:56.014213 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:43:56.018944 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:43:56.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.019067 systemd[1]: Stopped iscsid.service. May 10 00:43:56.021607 systemd[1]: Stopping iscsiuio.service... May 10 00:43:56.028187 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:43:56.028331 systemd[1]: Stopped iscsiuio.service. May 10 00:43:56.041154 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:43:56.046194 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:43:56.046309 systemd[1]: Stopped ignition-mount.service. May 10 00:43:56.047265 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:43:56.047344 systemd[1]: Stopped ignition-disks.service. May 10 00:43:56.048577 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:43:56.048639 systemd[1]: Stopped ignition-kargs.service. May 10 00:43:56.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.049926 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:43:56.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.049981 systemd[1]: Stopped ignition-fetch.service. May 10 00:43:56.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.051251 systemd[1]: Stopped target network.target. May 10 00:43:56.052543 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:43:56.052606 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:43:56.053917 systemd[1]: Stopped target paths.target. May 10 00:43:56.055168 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:43:56.058365 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:43:56.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.059229 systemd[1]: Stopped target slices.target. May 10 00:43:56.060518 systemd[1]: Stopped target sockets.target. May 10 00:43:56.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.061941 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:43:56.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.105000 audit: BPF prog-id=6 op=UNLOAD May 10 00:43:56.061997 systemd[1]: Closed iscsid.socket. May 10 00:43:56.063241 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:43:56.063308 systemd[1]: Closed iscsiuio.socket. May 10 00:43:56.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.064488 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:43:56.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.064557 systemd[1]: Stopped ignition-setup.service. May 10 00:43:56.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.066179 systemd[1]: Stopping systemd-networkd.service... May 10 00:43:56.067556 systemd[1]: Stopping systemd-resolved.service... May 10 00:43:56.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.068355 systemd-networkd[937]: eth0: DHCPv6 lease lost May 10 00:43:56.120000 audit: BPF prog-id=9 op=UNLOAD May 10 00:43:56.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.070498 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:43:56.070625 systemd[1]: Stopped systemd-networkd.service. May 10 00:43:56.072453 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:43:56.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.072506 systemd[1]: Closed systemd-networkd.socket. May 10 00:43:56.081210 systemd[1]: Stopping network-cleanup.service... May 10 00:43:56.083680 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:43:56.083777 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:43:56.085107 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:43:56.085170 systemd[1]: Stopped systemd-sysctl.service. May 10 00:43:56.086721 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:43:56.086781 systemd[1]: Stopped systemd-modules-load.service. May 10 00:43:56.094244 systemd[1]: Stopping systemd-udevd.service... May 10 00:43:56.097548 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:43:56.098246 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:43:56.098383 systemd[1]: Stopped systemd-resolved.service. May 10 00:43:56.102261 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:43:56.102618 systemd[1]: Stopped systemd-udevd.service. May 10 00:43:56.105535 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:43:56.105668 systemd[1]: Stopped network-cleanup.service. May 10 00:43:56.106920 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:43:56.106969 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:43:56.108191 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:43:56.108235 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:43:56.109605 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:43:56.109666 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:43:56.110893 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:43:56.110947 systemd[1]: Stopped dracut-cmdline.service. May 10 00:43:56.112194 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:43:56.112249 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:43:56.114715 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:43:56.118230 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:43:56.118329 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:43:56.120136 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:43:56.120197 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:43:56.122694 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:43:56.122765 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:43:56.126900 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:43:56.127691 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:43:56.127816 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:43:56.211701 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:43:56.211804 systemd[1]: Stopped sysroot-boot.service. May 10 00:43:56.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.213276 systemd[1]: Reached target initrd-switch-root.target. May 10 00:43:56.214441 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:43:56.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.214512 systemd[1]: Stopped initrd-setup-root.service. May 10 00:43:56.216655 systemd[1]: Starting initrd-switch-root.service... May 10 00:43:56.229254 systemd[1]: Switching root. May 10 00:43:56.250980 systemd-journald[185]: Journal stopped May 10 00:44:00.147556 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 10 00:44:00.147631 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:44:00.147651 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:44:00.147669 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:44:00.147691 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:44:00.147707 kernel: SELinux: policy capability open_perms=1 May 10 00:44:00.147724 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:44:00.147745 kernel: SELinux: policy capability always_check_network=0 May 10 00:44:00.147761 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:44:00.147778 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:44:00.147796 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:44:00.147814 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:44:00.147830 systemd[1]: Successfully loaded SELinux policy in 58.860ms. May 10 00:44:00.149331 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.970ms. May 10 00:44:00.149395 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:00.149418 systemd[1]: Detected virtualization amazon. May 10 00:44:00.149442 systemd[1]: Detected architecture x86-64. May 10 00:44:00.149461 systemd[1]: Detected first boot. May 10 00:44:00.149488 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:00.149507 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:44:00.149528 systemd[1]: Populated /etc with preset unit settings. May 10 00:44:00.149553 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:00.149574 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:00.149600 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:00.149622 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:44:00.149645 systemd[1]: Stopped initrd-switch-root.service. May 10 00:44:00.149668 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:44:00.149690 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:44:00.149710 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:44:00.149731 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:44:00.149752 systemd[1]: Created slice system-getty.slice. May 10 00:44:00.149775 systemd[1]: Created slice system-modprobe.slice. May 10 00:44:00.149802 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:44:00.149823 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:44:00.149844 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:44:00.149865 systemd[1]: Created slice user.slice. May 10 00:44:00.149885 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:00.149905 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:44:00.149925 systemd[1]: Set up automount boot.automount. May 10 00:44:00.149946 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:44:00.149970 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:44:00.149990 systemd[1]: Stopped target initrd-fs.target. May 10 00:44:00.150011 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:44:00.150031 systemd[1]: Reached target integritysetup.target. May 10 00:44:00.150052 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:00.150073 systemd[1]: Reached target remote-fs.target. May 10 00:44:00.150094 systemd[1]: Reached target slices.target. May 10 00:44:00.150114 systemd[1]: Reached target swap.target. May 10 00:44:00.150137 systemd[1]: Reached target torcx.target. May 10 00:44:00.150158 systemd[1]: Reached target veritysetup.target. May 10 00:44:00.150178 systemd[1]: Listening on systemd-coredump.socket. May 10 00:44:00.150198 systemd[1]: Listening on systemd-initctl.socket. May 10 00:44:00.150219 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:00.150240 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:00.150261 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:00.150281 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:44:00.152269 systemd[1]: Mounting dev-hugepages.mount... May 10 00:44:00.152328 systemd[1]: Mounting dev-mqueue.mount... May 10 00:44:00.152356 systemd[1]: Mounting media.mount... May 10 00:44:00.152379 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:00.152401 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:44:00.152436 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:44:00.152463 systemd[1]: Mounting tmp.mount... May 10 00:44:00.152484 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:44:00.152507 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:00.152529 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:00.152550 systemd[1]: Starting modprobe@configfs.service... May 10 00:44:00.152571 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:00.152592 systemd[1]: Starting modprobe@drm.service... May 10 00:44:00.152613 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:00.152634 systemd[1]: Starting modprobe@fuse.service... May 10 00:44:00.152657 systemd[1]: Starting modprobe@loop.service... May 10 00:44:00.152679 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:44:00.152700 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:44:00.152721 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:44:00.152741 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:44:00.152763 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:44:00.152785 systemd[1]: Stopped systemd-journald.service. May 10 00:44:00.152805 systemd[1]: Starting systemd-journald.service... May 10 00:44:00.152826 kernel: loop: module loaded May 10 00:44:00.152849 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:00.152869 systemd[1]: Starting systemd-network-generator.service... May 10 00:44:00.152890 systemd[1]: Starting systemd-remount-fs.service... May 10 00:44:00.152911 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:00.152932 kernel: fuse: init (API version 7.34) May 10 00:44:00.152952 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:44:00.152973 systemd[1]: Stopped verity-setup.service. May 10 00:44:00.152994 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:00.153014 systemd[1]: Mounted dev-hugepages.mount. May 10 00:44:00.153037 systemd[1]: Mounted dev-mqueue.mount. May 10 00:44:00.153058 systemd[1]: Mounted media.mount. May 10 00:44:00.153079 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:44:00.153099 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:44:00.153120 systemd[1]: Mounted tmp.mount. May 10 00:44:00.153142 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:00.153163 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:44:00.153190 systemd-journald[1229]: Journal started May 10 00:44:00.153271 systemd-journald[1229]: Runtime Journal (/run/log/journal/ec297bd8de5f101186ced84e711b5f55) is 4.8M, max 38.3M, 33.5M free. May 10 00:43:56.661000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:43:56.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:43:56.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:43:56.761000 audit: BPF prog-id=10 op=LOAD May 10 00:43:56.761000 audit: BPF prog-id=10 op=UNLOAD May 10 00:43:56.761000 audit: BPF prog-id=11 op=LOAD May 10 00:43:56.761000 audit: BPF prog-id=11 op=UNLOAD May 10 00:43:56.906000 audit[1146]: AVC avc: denied { associate } for pid=1146 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:43:56.906000 audit[1146]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1129 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:56.906000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:43:56.910000 audit[1146]: AVC avc: denied { associate } for pid=1146 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:43:56.910000 audit[1146]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1129 pid=1146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:43:56.910000 audit: CWD cwd="/" May 10 00:43:56.910000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:56.910000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:43:56.910000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:43:59.890000 audit: BPF prog-id=12 op=LOAD May 10 00:43:59.890000 audit: BPF prog-id=3 op=UNLOAD May 10 00:43:59.890000 audit: BPF prog-id=13 op=LOAD May 10 00:43:59.890000 audit: BPF prog-id=14 op=LOAD May 10 00:43:59.890000 audit: BPF prog-id=4 op=UNLOAD May 10 00:43:59.890000 audit: BPF prog-id=5 op=UNLOAD May 10 00:43:59.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:59.899000 audit: BPF prog-id=12 op=UNLOAD May 10 00:44:00.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.063000 audit: BPF prog-id=15 op=LOAD May 10 00:44:00.063000 audit: BPF prog-id=16 op=LOAD May 10 00:44:00.063000 audit: BPF prog-id=17 op=LOAD May 10 00:44:00.063000 audit: BPF prog-id=13 op=UNLOAD May 10 00:44:00.063000 audit: BPF prog-id=14 op=UNLOAD May 10 00:44:00.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.144000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:44:00.144000 audit[1229]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff8417de90 a2=4000 a3=7fff8417df2c items=0 ppid=1 pid=1229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:00.144000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:44:00.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.899519 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:43:59.889581 systemd[1]: Queued start job for default target multi-user.target. May 10 00:44:00.159413 systemd[1]: Finished modprobe@configfs.service. May 10 00:43:56.900926 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:43:59.889595 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 10 00:43:56.900955 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:43:59.892660 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:43:56.900999 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:43:56.901015 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:44:00.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:43:56.901062 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:43:56.901082 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:43:56.901361 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:44:00.163535 systemd[1]: Started systemd-journald.service. May 10 00:43:56.901546 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:43:56.901574 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:43:56.904345 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:43:56.904407 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:43:56.904436 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:43:56.904464 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:43:56.904496 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:43:56.904516 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:43:59.371343 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:59Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:59.371598 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:59Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:59.371706 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:59Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:59.371893 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:59Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:43:59.371943 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:59Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:43:59.372000 /usr/lib/systemd/system-generators/torcx-generator[1146]: time="2025-05-10T00:43:59Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:44:00.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.166952 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:00.167388 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:00.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.169053 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:00.169540 systemd[1]: Finished modprobe@drm.service. May 10 00:44:00.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.171716 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:00.171883 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:00.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.174253 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:44:00.174428 systemd[1]: Finished modprobe@fuse.service. May 10 00:44:00.176003 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:00.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.178305 systemd[1]: Finished modprobe@loop.service. May 10 00:44:00.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.183581 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:00.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.187284 systemd[1]: Finished systemd-network-generator.service. May 10 00:44:00.189221 systemd[1]: Finished systemd-remount-fs.service. May 10 00:44:00.191263 systemd[1]: Reached target network-pre.target. May 10 00:44:00.194566 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:44:00.197506 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:44:00.198770 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:44:00.205381 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:44:00.209212 systemd[1]: Starting systemd-journal-flush.service... May 10 00:44:00.210452 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:00.212063 systemd[1]: Starting systemd-random-seed.service... May 10 00:44:00.213404 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:00.214950 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:00.220663 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:44:00.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.230605 systemd-journald[1229]: Time spent on flushing to /var/log/journal/ec297bd8de5f101186ced84e711b5f55 is 58.168ms for 1199 entries. May 10 00:44:00.230605 systemd-journald[1229]: System Journal (/var/log/journal/ec297bd8de5f101186ced84e711b5f55) is 8.0M, max 195.6M, 187.6M free. May 10 00:44:00.312580 systemd-journald[1229]: Received client request to flush runtime journal. May 10 00:44:00.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.222426 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:44:00.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.223965 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:44:00.315853 udevadm[1265]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:44:00.227704 systemd[1]: Starting systemd-sysusers.service... May 10 00:44:00.235913 systemd[1]: Finished systemd-random-seed.service. May 10 00:44:00.237103 systemd[1]: Reached target first-boot-complete.target. May 10 00:44:00.267054 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:00.270246 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:00.272864 systemd[1]: Starting systemd-udev-settle.service... May 10 00:44:00.304099 systemd[1]: Finished systemd-sysusers.service. May 10 00:44:00.306535 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:44:00.314232 systemd[1]: Finished systemd-journal-flush.service. May 10 00:44:00.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.370687 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:44:00.857279 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:44:00.863723 kernel: kauditd_printk_skb: 96 callbacks suppressed May 10 00:44:00.863839 kernel: audit: type=1130 audit(1746837840.856:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.865572 kernel: audit: type=1334 audit(1746837840.857:135): prog-id=18 op=LOAD May 10 00:44:00.857000 audit: BPF prog-id=18 op=LOAD May 10 00:44:00.864435 systemd[1]: Starting systemd-udevd.service... May 10 00:44:00.862000 audit: BPF prog-id=19 op=LOAD May 10 00:44:00.867893 kernel: audit: type=1334 audit(1746837840.862:136): prog-id=19 op=LOAD May 10 00:44:00.867949 kernel: audit: type=1334 audit(1746837840.862:137): prog-id=7 op=UNLOAD May 10 00:44:00.867981 kernel: audit: type=1334 audit(1746837840.862:138): prog-id=8 op=UNLOAD May 10 00:44:00.862000 audit: BPF prog-id=7 op=UNLOAD May 10 00:44:00.862000 audit: BPF prog-id=8 op=UNLOAD May 10 00:44:00.892761 systemd-udevd[1269]: Using default interface naming scheme 'v252'. May 10 00:44:00.985101 kernel: audit: type=1130 audit(1746837840.968:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.985223 kernel: audit: type=1334 audit(1746837840.969:140): prog-id=20 op=LOAD May 10 00:44:00.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:00.969000 audit: BPF prog-id=20 op=LOAD May 10 00:44:00.968907 systemd[1]: Started systemd-udevd.service. May 10 00:44:00.972217 systemd[1]: Starting systemd-networkd.service... May 10 00:44:01.017151 kernel: audit: type=1334 audit(1746837841.006:141): prog-id=21 op=LOAD May 10 00:44:01.017346 kernel: audit: type=1334 audit(1746837841.009:142): prog-id=22 op=LOAD May 10 00:44:01.027571 kernel: audit: type=1334 audit(1746837841.011:143): prog-id=23 op=LOAD May 10 00:44:01.006000 audit: BPF prog-id=21 op=LOAD May 10 00:44:01.009000 audit: BPF prog-id=22 op=LOAD May 10 00:44:01.011000 audit: BPF prog-id=23 op=LOAD May 10 00:44:01.016003 systemd[1]: Starting systemd-userdbd.service... May 10 00:44:01.071875 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:44:01.075893 systemd[1]: Started systemd-userdbd.service. May 10 00:44:01.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.145347 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:44:01.152598 (udev-worker)[1273]: Network interface NamePolicy= disabled on kernel command line. May 10 00:44:01.185326 kernel: ACPI: button: Power Button [PWRF] May 10 00:44:01.205859 systemd-networkd[1276]: lo: Link UP May 10 00:44:01.205873 systemd-networkd[1276]: lo: Gained carrier May 10 00:44:01.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.207796 systemd-networkd[1276]: Enumeration completed May 10 00:44:01.207927 systemd[1]: Started systemd-networkd.service. May 10 00:44:01.210604 systemd-networkd[1276]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:44:01.211366 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:44:01.216434 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 10 00:44:01.218979 systemd-networkd[1276]: eth0: Link UP May 10 00:44:01.219312 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:44:01.219449 systemd-networkd[1276]: eth0: Gained carrier May 10 00:44:01.190000 audit[1282]: AVC avc: denied { confidentiality } for pid=1282 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:44:01.230490 systemd-networkd[1276]: eth0: DHCPv4 address 172.31.18.109/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:44:01.237322 kernel: ACPI: button: Sleep Button [SLPF] May 10 00:44:01.190000 audit[1282]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5577a31c8d90 a1=338ac a2=7f7214185bc5 a3=5 items=110 ppid=1269 pid=1282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:01.190000 audit: CWD cwd="/" May 10 00:44:01.190000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=1 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=2 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=3 name=(null) inode=15373 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=4 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=5 name=(null) inode=15374 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=6 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=7 name=(null) inode=15375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=8 name=(null) inode=15375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=9 name=(null) inode=15376 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=10 name=(null) inode=15375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=11 name=(null) inode=15377 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=12 name=(null) inode=15375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=13 name=(null) inode=15378 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=14 name=(null) inode=15375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=15 name=(null) inode=15379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=16 name=(null) inode=15375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=17 name=(null) inode=15380 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=18 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=19 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=20 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=21 name=(null) inode=15382 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=22 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=23 name=(null) inode=15383 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=24 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=25 name=(null) inode=15384 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=26 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=27 name=(null) inode=15385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=28 name=(null) inode=15381 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=29 name=(null) inode=15386 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=30 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=31 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=32 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=33 name=(null) inode=15388 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=34 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=35 name=(null) inode=15389 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=36 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=37 name=(null) inode=15390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=38 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=39 name=(null) inode=15391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=40 name=(null) inode=15387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=41 name=(null) inode=15392 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=42 name=(null) inode=15372 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=43 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=44 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=45 name=(null) inode=15394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=46 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=47 name=(null) inode=15395 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=48 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=49 name=(null) inode=15396 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=50 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=51 name=(null) inode=15397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=52 name=(null) inode=15393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=53 name=(null) inode=15398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=55 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=56 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=57 name=(null) inode=15400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=58 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=59 name=(null) inode=15401 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=60 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=61 name=(null) inode=15402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=62 name=(null) inode=15402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=63 name=(null) inode=15403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=64 name=(null) inode=15402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=65 name=(null) inode=15404 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=66 name=(null) inode=15402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=67 name=(null) inode=15405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=68 name=(null) inode=15402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=69 name=(null) inode=15406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=70 name=(null) inode=15402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=71 name=(null) inode=15407 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=72 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=73 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=74 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=75 name=(null) inode=15409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=76 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=77 name=(null) inode=15410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=78 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=79 name=(null) inode=15411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=80 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=81 name=(null) inode=15412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=82 name=(null) inode=15408 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=83 name=(null) inode=15413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=84 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=85 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=86 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=87 name=(null) inode=15415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=88 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=89 name=(null) inode=15416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=90 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=91 name=(null) inode=15417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=92 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=93 name=(null) inode=15418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=94 name=(null) inode=15414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=95 name=(null) inode=15419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=96 name=(null) inode=15399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=97 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=98 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=99 name=(null) inode=15421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=100 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=101 name=(null) inode=15422 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=102 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=103 name=(null) inode=15423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=104 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=105 name=(null) inode=15424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=106 name=(null) inode=15420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=107 name=(null) inode=15425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PATH item=109 name=(null) inode=15426 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:01.190000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:44:01.255363 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 10 00:44:01.263323 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:44:01.263421 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 10 00:44:01.398538 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:01.401888 systemd[1]: Finished systemd-udev-settle.service. May 10 00:44:01.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.406977 systemd[1]: Starting lvm2-activation-early.service... May 10 00:44:01.452475 lvm[1383]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:44:01.483540 systemd[1]: Finished lvm2-activation-early.service. May 10 00:44:01.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.484437 systemd[1]: Reached target cryptsetup.target. May 10 00:44:01.486375 systemd[1]: Starting lvm2-activation.service... May 10 00:44:01.491306 lvm[1384]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:44:01.518188 systemd[1]: Finished lvm2-activation.service. May 10 00:44:01.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.519151 systemd[1]: Reached target local-fs-pre.target. May 10 00:44:01.519917 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:44:01.519959 systemd[1]: Reached target local-fs.target. May 10 00:44:01.520702 systemd[1]: Reached target machines.target. May 10 00:44:01.522685 systemd[1]: Starting ldconfig.service... May 10 00:44:01.524879 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:01.524955 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:01.526628 systemd[1]: Starting systemd-boot-update.service... May 10 00:44:01.529049 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:44:01.532405 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:44:01.536855 systemd[1]: Starting systemd-sysext.service... May 10 00:44:01.548066 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1386 (bootctl) May 10 00:44:01.549999 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:44:01.562510 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:44:01.570752 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:44:01.571106 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:44:01.590524 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:44:01.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.588743 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:44:01.723931 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:44:01.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.724833 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:44:01.731330 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:44:01.758329 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:44:01.788036 (sd-sysext)[1399]: Using extensions 'kubernetes'. May 10 00:44:01.788869 (sd-sysext)[1399]: Merged extensions into '/usr'. May 10 00:44:01.813324 systemd-fsck[1396]: fsck.fat 4.2 (2021-01-31) May 10 00:44:01.813324 systemd-fsck[1396]: /dev/nvme0n1p1: 790 files, 120688/258078 clusters May 10 00:44:01.819464 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:44:01.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.822373 systemd[1]: Mounting boot.mount... May 10 00:44:01.823472 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:01.825736 systemd[1]: Mounting usr-share-oem.mount... May 10 00:44:01.829706 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:01.831413 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:01.836263 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:01.839750 systemd[1]: Starting modprobe@loop.service... May 10 00:44:01.842470 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:01.842682 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:01.842854 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:01.844446 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:01.844630 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:01.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.847019 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:01.847204 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:01.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.852836 systemd[1]: Mounted usr-share-oem.mount. May 10 00:44:01.854371 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:01.854550 systemd[1]: Finished modprobe@loop.service. May 10 00:44:01.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.859515 systemd[1]: Mounted boot.mount. May 10 00:44:01.862630 systemd[1]: Finished systemd-sysext.service. May 10 00:44:01.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:01.867282 systemd[1]: Starting ensure-sysext.service... May 10 00:44:01.869170 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:01.869473 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:01.871168 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:44:01.891386 systemd[1]: Reloading. May 10 00:44:01.909935 systemd-tmpfiles[1416]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:44:01.914405 systemd-tmpfiles[1416]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:44:01.923258 systemd-tmpfiles[1416]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:44:01.958442 /usr/lib/systemd/system-generators/torcx-generator[1437]: time="2025-05-10T00:44:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:01.958978 /usr/lib/systemd/system-generators/torcx-generator[1437]: time="2025-05-10T00:44:01Z" level=info msg="torcx already run" May 10 00:44:02.117095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:02.117120 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:02.150538 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:02.241000 audit: BPF prog-id=24 op=LOAD May 10 00:44:02.241000 audit: BPF prog-id=20 op=UNLOAD May 10 00:44:02.244000 audit: BPF prog-id=25 op=LOAD May 10 00:44:02.244000 audit: BPF prog-id=15 op=UNLOAD May 10 00:44:02.244000 audit: BPF prog-id=26 op=LOAD May 10 00:44:02.244000 audit: BPF prog-id=27 op=LOAD May 10 00:44:02.244000 audit: BPF prog-id=16 op=UNLOAD May 10 00:44:02.244000 audit: BPF prog-id=17 op=UNLOAD May 10 00:44:02.245000 audit: BPF prog-id=28 op=LOAD May 10 00:44:02.245000 audit: BPF prog-id=21 op=UNLOAD May 10 00:44:02.245000 audit: BPF prog-id=29 op=LOAD May 10 00:44:02.245000 audit: BPF prog-id=30 op=LOAD May 10 00:44:02.245000 audit: BPF prog-id=22 op=UNLOAD May 10 00:44:02.245000 audit: BPF prog-id=23 op=UNLOAD May 10 00:44:02.247000 audit: BPF prog-id=31 op=LOAD May 10 00:44:02.247000 audit: BPF prog-id=32 op=LOAD May 10 00:44:02.247000 audit: BPF prog-id=18 op=UNLOAD May 10 00:44:02.247000 audit: BPF prog-id=19 op=UNLOAD May 10 00:44:02.254494 systemd[1]: Finished systemd-boot-update.service. May 10 00:44:02.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.256700 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:44:02.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.267629 systemd[1]: Starting audit-rules.service... May 10 00:44:02.270021 systemd[1]: Starting clean-ca-certificates.service... May 10 00:44:02.272978 systemd-networkd[1276]: eth0: Gained IPv6LL May 10 00:44:02.275148 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:44:02.277000 audit: BPF prog-id=33 op=LOAD May 10 00:44:02.281554 systemd[1]: Starting systemd-resolved.service... May 10 00:44:02.282000 audit: BPF prog-id=34 op=LOAD May 10 00:44:02.284953 systemd[1]: Starting systemd-timesyncd.service... May 10 00:44:02.289094 systemd[1]: Starting systemd-update-utmp.service... May 10 00:44:02.290803 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:44:02.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.301402 systemd[1]: Finished clean-ca-certificates.service. May 10 00:44:02.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.302914 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:02.306899 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:02.310122 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:02.315066 systemd[1]: Starting modprobe@loop.service... May 10 00:44:02.316098 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:02.316325 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:02.316524 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:02.321642 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:02.321841 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:02.321970 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:02.322082 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:02.328104 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:02.330092 systemd[1]: Starting modprobe@drm.service... May 10 00:44:02.332557 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:02.332781 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:02.333007 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:02.339605 systemd[1]: Finished ensure-sysext.service. May 10 00:44:02.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.344796 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:02.344974 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:02.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.346321 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:02.346504 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:02.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.347512 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:02.354000 audit[1499]: SYSTEM_BOOT pid=1499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:44:02.357754 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:02.357929 systemd[1]: Finished modprobe@loop.service. May 10 00:44:02.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.358907 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:02.361494 systemd[1]: Finished systemd-update-utmp.service. May 10 00:44:02.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.363569 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:02.363737 systemd[1]: Finished modprobe@drm.service. May 10 00:44:02.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.385213 ldconfig[1385]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:44:02.395661 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:44:02.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.399390 systemd[1]: Finished ldconfig.service. May 10 00:44:02.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.401970 systemd[1]: Starting systemd-update-done.service... May 10 00:44:02.417315 systemd[1]: Finished systemd-update-done.service. May 10 00:44:02.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.439646 augenrules[1519]: No rules May 10 00:44:02.437000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:44:02.437000 audit[1519]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe64f8a200 a2=420 a3=0 items=0 ppid=1494 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:02.437000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:44:02.440000 systemd[1]: Finished audit-rules.service. May 10 00:44:02.455688 systemd-resolved[1497]: Positive Trust Anchors: May 10 00:44:02.456041 systemd-resolved[1497]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:02.456163 systemd-resolved[1497]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:02.467998 systemd[1]: Started systemd-timesyncd.service. May 10 00:44:02.468556 systemd[1]: Reached target time-set.target. May 10 00:44:02.497202 systemd-resolved[1497]: Defaulting to hostname 'linux'. May 10 00:44:02.499129 systemd[1]: Started systemd-resolved.service. May 10 00:44:02.499622 systemd[1]: Reached target network.target. May 10 00:44:02.499998 systemd[1]: Reached target network-online.target. May 10 00:44:02.500395 systemd[1]: Reached target nss-lookup.target. May 10 00:44:02.500888 systemd[1]: Reached target sysinit.target. May 10 00:44:02.501856 systemd[1]: Started motdgen.path. May 10 00:44:02.502574 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:44:02.503207 systemd[1]: Started logrotate.timer. May 10 00:44:02.503732 systemd[1]: Started mdadm.timer. May 10 00:44:02.504157 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:44:02.504589 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:44:02.504635 systemd[1]: Reached target paths.target. May 10 00:44:02.505063 systemd[1]: Reached target timers.target. May 10 00:44:02.505853 systemd[1]: Listening on dbus.socket. May 10 00:44:02.507526 systemd[1]: Starting docker.socket... May 10 00:44:02.512061 systemd[1]: Listening on sshd.socket. May 10 00:44:02.512677 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:02.513211 systemd[1]: Listening on docker.socket. May 10 00:44:02.513868 systemd[1]: Reached target sockets.target. May 10 00:44:02.514290 systemd[1]: Reached target basic.target. May 10 00:44:02.514750 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:44:02.514788 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:44:02.515997 systemd[1]: Started amazon-ssm-agent.service. May 10 00:44:02.517994 systemd[1]: Starting containerd.service... May 10 00:44:02.521391 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:44:02.523622 systemd[1]: Starting dbus.service... May 10 00:44:02.525917 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:44:02.529193 systemd[1]: Starting extend-filesystems.service... May 10 00:44:02.531434 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:44:02.541952 systemd[1]: Starting kubelet.service... May 10 00:44:02.550860 systemd[1]: Starting motdgen.service... May 10 00:44:02.556582 systemd[1]: Started nvidia.service. May 10 00:44:02.564458 systemd[1]: Starting prepare-helm.service... May 10 00:44:02.566863 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:44:03.028201 systemd-timesyncd[1498]: Contacted time server 70.116.101.97:123 (0.flatcar.pool.ntp.org). May 10 00:44:03.028271 systemd-timesyncd[1498]: Initial clock synchronization to Sat 2025-05-10 00:44:03.028050 UTC. May 10 00:44:03.028556 systemd[1]: Starting sshd-keygen.service... May 10 00:44:03.046736 systemd[1]: Starting systemd-logind.service... May 10 00:44:03.050004 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:03.050117 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:44:03.130844 jq[1531]: false May 10 00:44:03.131028 jq[1544]: true May 10 00:44:03.052665 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:44:03.053192 systemd-resolved[1497]: Clock change detected. Flushing caches. May 10 00:44:03.053772 systemd[1]: Starting update-engine.service... May 10 00:44:03.060380 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:44:03.089571 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:03.171519 jq[1551]: true May 10 00:44:03.089634 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:03.092894 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:44:03.093066 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:44:03.123820 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:44:03.124038 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:44:03.185604 tar[1549]: linux-amd64/helm May 10 00:44:03.197936 extend-filesystems[1532]: Found loop1 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p1 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p2 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p3 May 10 00:44:03.197936 extend-filesystems[1532]: Found usr May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p4 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p6 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p7 May 10 00:44:03.197936 extend-filesystems[1532]: Found nvme0n1p9 May 10 00:44:03.197936 extend-filesystems[1532]: Checking size of /dev/nvme0n1p9 May 10 00:44:03.337306 extend-filesystems[1532]: Resized partition /dev/nvme0n1p9 May 10 00:44:03.390010 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 10 00:44:03.231983 dbus-daemon[1530]: [system] SELinux support is enabled May 10 00:44:03.232198 systemd[1]: Started dbus.service. May 10 00:44:03.391481 update_engine[1542]: I0510 00:44:03.363600 1542 main.cc:92] Flatcar Update Engine starting May 10 00:44:03.391481 update_engine[1542]: I0510 00:44:03.372488 1542 update_check_scheduler.cc:74] Next update check in 5m18s May 10 00:44:03.391730 extend-filesystems[1583]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:44:03.285007 dbus-daemon[1530]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1276 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 00:44:03.236013 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:44:03.236052 systemd[1]: Reached target system-config.target. May 10 00:44:03.236860 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:44:03.236888 systemd[1]: Reached target user-config.target. May 10 00:44:03.295032 systemd[1]: Starting systemd-hostnamed.service... May 10 00:44:03.372296 systemd[1]: Started update-engine.service. May 10 00:44:03.384557 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:44:03.384776 systemd[1]: Finished motdgen.service. May 10 00:44:03.387918 systemd[1]: Started locksmithd.service. May 10 00:44:03.417678 amazon-ssm-agent[1527]: 2025/05/10 00:44:03 Failed to load instance info from vault. RegistrationKey does not exist. May 10 00:44:03.422028 amazon-ssm-agent[1527]: Initializing new seelog logger May 10 00:44:03.430950 env[1555]: time="2025-05-10T00:44:03.430458982Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:44:03.431441 amazon-ssm-agent[1527]: New Seelog Logger Creation Complete May 10 00:44:03.431799 amazon-ssm-agent[1527]: 2025/05/10 00:44:03 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:44:03.433385 amazon-ssm-agent[1527]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:44:03.433726 amazon-ssm-agent[1527]: 2025/05/10 00:44:03 processing appconfig overrides May 10 00:44:03.454128 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 10 00:44:03.469846 extend-filesystems[1583]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 10 00:44:03.469846 extend-filesystems[1583]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:44:03.469846 extend-filesystems[1583]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 10 00:44:03.484305 extend-filesystems[1532]: Resized filesystem in /dev/nvme0n1p9 May 10 00:44:03.472970 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:44:03.473215 systemd[1]: Finished extend-filesystems.service. May 10 00:44:03.522847 bash[1602]: Updated "/home/core/.ssh/authorized_keys" May 10 00:44:03.523600 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:44:03.596063 systemd-logind[1540]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:44:03.597754 systemd-logind[1540]: Watching system buttons on /dev/input/event2 (Sleep Button) May 10 00:44:03.597921 systemd-logind[1540]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:44:03.606575 systemd-logind[1540]: New seat seat0. May 10 00:44:03.618502 systemd[1]: Started systemd-logind.service. May 10 00:44:03.655795 env[1555]: time="2025-05-10T00:44:03.655675572Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:44:03.655916 env[1555]: time="2025-05-10T00:44:03.655862407Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:03.665266 env[1555]: time="2025-05-10T00:44:03.665210397Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:03.665266 env[1555]: time="2025-05-10T00:44:03.665263208Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:03.665843 env[1555]: time="2025-05-10T00:44:03.665800281Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:03.665843 env[1555]: time="2025-05-10T00:44:03.665842518Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:44:03.665983 env[1555]: time="2025-05-10T00:44:03.665861874Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:44:03.665983 env[1555]: time="2025-05-10T00:44:03.665875405Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:44:03.666062 env[1555]: time="2025-05-10T00:44:03.665987211Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:03.692797 env[1555]: time="2025-05-10T00:44:03.692750989Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:03.693112 env[1555]: time="2025-05-10T00:44:03.693049952Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:03.693198 env[1555]: time="2025-05-10T00:44:03.693114473Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:44:03.693246 env[1555]: time="2025-05-10T00:44:03.693208059Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:44:03.693246 env[1555]: time="2025-05-10T00:44:03.693227294Z" level=info msg="metadata content store policy set" policy=shared May 10 00:44:03.695213 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:44:03.706210 env[1555]: time="2025-05-10T00:44:03.706144952Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:44:03.706344 env[1555]: time="2025-05-10T00:44:03.706218315Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:44:03.706344 env[1555]: time="2025-05-10T00:44:03.706236112Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:44:03.706344 env[1555]: time="2025-05-10T00:44:03.706324947Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706462 env[1555]: time="2025-05-10T00:44:03.706406144Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706462 env[1555]: time="2025-05-10T00:44:03.706443631Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706555 env[1555]: time="2025-05-10T00:44:03.706468142Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706555 env[1555]: time="2025-05-10T00:44:03.706491803Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706555 env[1555]: time="2025-05-10T00:44:03.706529002Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706555 env[1555]: time="2025-05-10T00:44:03.706549773Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706690 env[1555]: time="2025-05-10T00:44:03.706569922Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:44:03.706690 env[1555]: time="2025-05-10T00:44:03.706605530Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:44:03.706808 env[1555]: time="2025-05-10T00:44:03.706787002Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:44:03.706959 env[1555]: time="2025-05-10T00:44:03.706934834Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:44:03.707542 env[1555]: time="2025-05-10T00:44:03.707513195Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:44:03.707623 env[1555]: time="2025-05-10T00:44:03.707558556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707623 env[1555]: time="2025-05-10T00:44:03.707597651Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:44:03.707702 env[1555]: time="2025-05-10T00:44:03.707691224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707753 env[1555]: time="2025-05-10T00:44:03.707712737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707834 env[1555]: time="2025-05-10T00:44:03.707802563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707877 env[1555]: time="2025-05-10T00:44:03.707840341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707877 env[1555]: time="2025-05-10T00:44:03.707860039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707954 env[1555]: time="2025-05-10T00:44:03.707879068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707954 env[1555]: time="2025-05-10T00:44:03.707914683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:44:03.707954 env[1555]: time="2025-05-10T00:44:03.707933004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:44:03.708070 env[1555]: time="2025-05-10T00:44:03.707954142Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:44:03.708203 env[1555]: time="2025-05-10T00:44:03.708181046Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:44:03.708256 env[1555]: time="2025-05-10T00:44:03.708211452Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:44:03.708256 env[1555]: time="2025-05-10T00:44:03.708231240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:44:03.708340 env[1555]: time="2025-05-10T00:44:03.708265231Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:44:03.708340 env[1555]: time="2025-05-10T00:44:03.708291425Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:44:03.708340 env[1555]: time="2025-05-10T00:44:03.708309037Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:44:03.708451 env[1555]: time="2025-05-10T00:44:03.708348560Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:44:03.708451 env[1555]: time="2025-05-10T00:44:03.708393407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:44:03.708771 env[1555]: time="2025-05-10T00:44:03.708675629Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:44:03.711946 env[1555]: time="2025-05-10T00:44:03.708786575Z" level=info msg="Connect containerd service" May 10 00:44:03.711946 env[1555]: time="2025-05-10T00:44:03.708835431Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:44:03.714483 env[1555]: time="2025-05-10T00:44:03.714439757Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:44:03.715314 env[1555]: time="2025-05-10T00:44:03.715283840Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:44:03.715393 env[1555]: time="2025-05-10T00:44:03.715355254Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:44:03.719240 env[1555]: time="2025-05-10T00:44:03.719174246Z" level=info msg="Start subscribing containerd event" May 10 00:44:03.719335 env[1555]: time="2025-05-10T00:44:03.719260379Z" level=info msg="Start recovering state" May 10 00:44:03.719393 env[1555]: time="2025-05-10T00:44:03.719341323Z" level=info msg="Start event monitor" May 10 00:44:03.719393 env[1555]: time="2025-05-10T00:44:03.719358137Z" level=info msg="Start snapshots syncer" May 10 00:44:03.719393 env[1555]: time="2025-05-10T00:44:03.719372571Z" level=info msg="Start cni network conf syncer for default" May 10 00:44:03.719393 env[1555]: time="2025-05-10T00:44:03.719383697Z" level=info msg="Start streaming server" May 10 00:44:03.719773 systemd[1]: Started containerd.service. May 10 00:44:03.721554 env[1555]: time="2025-05-10T00:44:03.721514970Z" level=info msg="containerd successfully booted in 0.308322s" May 10 00:44:03.778813 coreos-metadata[1529]: May 10 00:44:03.774 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 10 00:44:03.782595 coreos-metadata[1529]: May 10 00:44:03.782 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 10 00:44:03.784061 coreos-metadata[1529]: May 10 00:44:03.783 INFO Fetch successful May 10 00:44:03.784288 coreos-metadata[1529]: May 10 00:44:03.784 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 00:44:03.785642 coreos-metadata[1529]: May 10 00:44:03.785 INFO Fetch successful May 10 00:44:03.788855 unknown[1529]: wrote ssh authorized keys file for user: core May 10 00:44:03.813728 update-ssh-keys[1643]: Updated "/home/core/.ssh/authorized_keys" May 10 00:44:03.815297 dbus-daemon[1530]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 00:44:03.814630 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:44:03.815800 dbus-daemon[1530]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1579 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 00:44:03.816136 systemd[1]: Started systemd-hostnamed.service. May 10 00:44:03.821694 systemd[1]: Starting polkit.service... May 10 00:44:03.854995 polkitd[1647]: Started polkitd version 121 May 10 00:44:03.881020 polkitd[1647]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:44:03.881125 polkitd[1647]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:44:03.890043 polkitd[1647]: Finished loading, compiling and executing 2 rules May 10 00:44:03.890682 dbus-daemon[1530]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:44:03.890880 systemd[1]: Started polkit.service. May 10 00:44:03.892936 polkitd[1647]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:44:03.912339 systemd-hostnamed[1579]: Hostname set to (transient) May 10 00:44:03.912462 systemd-resolved[1497]: System hostname changed to 'ip-172-31-18-109'. May 10 00:44:04.109628 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Create new startup processor May 10 00:44:04.130298 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [LongRunningPluginsManager] registered plugins: {} May 10 00:44:04.130484 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing bookkeeping folders May 10 00:44:04.130570 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO removing the completed state files May 10 00:44:04.130661 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing bookkeeping folders for long running plugins May 10 00:44:04.130745 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 10 00:44:04.130821 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing healthcheck folders for long running plugins May 10 00:44:04.130902 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing locations for inventory plugin May 10 00:44:04.130995 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing default location for custom inventory May 10 00:44:04.131127 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing default location for file inventory May 10 00:44:04.131658 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Initializing default location for role inventory May 10 00:44:04.131782 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Init the cloudwatchlogs publisher May 10 00:44:04.131873 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:configureDocker May 10 00:44:04.131963 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:refreshAssociation May 10 00:44:04.132048 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:configurePackage May 10 00:44:04.132134 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:downloadContent May 10 00:44:04.132222 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:runDocument May 10 00:44:04.132310 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:softwareInventory May 10 00:44:04.132396 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:updateSsmAgent May 10 00:44:04.132489 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:runDockerAction May 10 00:44:04.132623 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform independent plugin aws:runPowerShellScript May 10 00:44:04.132715 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Successfully loaded platform dependent plugin aws:runShellScript May 10 00:44:04.132805 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 10 00:44:04.135945 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO OS: linux, Arch: amd64 May 10 00:44:04.140132 amazon-ssm-agent[1527]: datastore file /var/lib/amazon/ssm/i-06366a3dbcb47db01/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 10 00:44:04.223979 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] Starting session document processing engine... May 10 00:44:04.318804 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] [EngineProcessor] Starting May 10 00:44:04.387852 systemd[1]: Created slice system-sshd.slice. May 10 00:44:04.413108 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 10 00:44:04.445813 tar[1549]: linux-amd64/LICENSE May 10 00:44:04.446347 tar[1549]: linux-amd64/README.md May 10 00:44:04.453242 systemd[1]: Finished prepare-helm.service. May 10 00:44:04.464658 sshd_keygen[1550]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:44:04.497408 systemd[1]: Finished sshd-keygen.service. May 10 00:44:04.500036 systemd[1]: Starting issuegen.service... May 10 00:44:04.503524 systemd[1]: Started sshd@0-172.31.18.109:22-139.178.89.65:47248.service. May 10 00:44:04.507797 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-06366a3dbcb47db01, requestId: 469d257f-1fe4-4ac8-a382-26c75139fb41 May 10 00:44:04.513729 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:44:04.513932 systemd[1]: Finished issuegen.service. May 10 00:44:04.516864 systemd[1]: Starting systemd-user-sessions.service... May 10 00:44:04.529278 systemd[1]: Finished systemd-user-sessions.service. May 10 00:44:04.532428 systemd[1]: Started getty@tty1.service. May 10 00:44:04.535839 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:44:04.537608 systemd[1]: Reached target getty.target. May 10 00:44:04.602437 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] Starting document processing engine... May 10 00:44:04.613964 locksmithd[1591]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:44:04.697387 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 10 00:44:04.709073 sshd[1728]: Accepted publickey for core from 139.178.89.65 port 47248 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:04.712066 sshd[1728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:04.736042 systemd[1]: Created slice user-500.slice. May 10 00:44:04.738942 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:44:04.744229 systemd-logind[1540]: New session 1 of user core. May 10 00:44:04.753633 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:44:04.756384 systemd[1]: Starting user@500.service... May 10 00:44:04.761554 (systemd)[1741]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:04.792490 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 10 00:44:04.864835 systemd[1741]: Queued start job for default target default.target. May 10 00:44:04.865487 systemd[1741]: Reached target paths.target. May 10 00:44:04.865517 systemd[1741]: Reached target sockets.target. May 10 00:44:04.865535 systemd[1741]: Reached target timers.target. May 10 00:44:04.865551 systemd[1741]: Reached target basic.target. May 10 00:44:04.865672 systemd[1]: Started user@500.service. May 10 00:44:04.867951 systemd[1]: Started session-1.scope. May 10 00:44:04.869169 systemd[1741]: Reached target default.target. May 10 00:44:04.869232 systemd[1741]: Startup finished in 100ms. May 10 00:44:04.887863 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] Starting message polling May 10 00:44:04.983824 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] Starting send replies to MDS May 10 00:44:05.010022 systemd[1]: Started sshd@1-172.31.18.109:22-139.178.89.65:47264.service. May 10 00:44:05.079629 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [instanceID=i-06366a3dbcb47db01] Starting association polling May 10 00:44:05.171099 sshd[1750]: Accepted publickey for core from 139.178.89.65 port 47264 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:05.173413 sshd[1750]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:05.175687 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 10 00:44:05.179526 systemd-logind[1540]: New session 2 of user core. May 10 00:44:05.180208 systemd[1]: Started session-2.scope. May 10 00:44:05.271608 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [Association] Launching response handler May 10 00:44:05.305150 sshd[1750]: pam_unix(sshd:session): session closed for user core May 10 00:44:05.308004 systemd[1]: sshd@1-172.31.18.109:22-139.178.89.65:47264.service: Deactivated successfully. May 10 00:44:05.308686 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:44:05.309776 systemd-logind[1540]: Session 2 logged out. Waiting for processes to exit. May 10 00:44:05.310788 systemd-logind[1540]: Removed session 2. May 10 00:44:05.331776 systemd[1]: Started sshd@2-172.31.18.109:22-139.178.89.65:47266.service. May 10 00:44:05.367906 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 10 00:44:05.464373 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 10 00:44:05.494684 sshd[1756]: Accepted publickey for core from 139.178.89.65 port 47266 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:05.496283 sshd[1756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:05.502131 systemd-logind[1540]: New session 3 of user core. May 10 00:44:05.502699 systemd[1]: Started session-3.scope. May 10 00:44:05.561047 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 10 00:44:05.631850 sshd[1756]: pam_unix(sshd:session): session closed for user core May 10 00:44:05.634432 systemd[1]: sshd@2-172.31.18.109:22-139.178.89.65:47266.service: Deactivated successfully. May 10 00:44:05.635094 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:44:05.635806 systemd-logind[1540]: Session 3 logged out. Waiting for processes to exit. May 10 00:44:05.636733 systemd-logind[1540]: Removed session 3. May 10 00:44:05.657803 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] listening reply. May 10 00:44:05.754883 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [HealthCheck] HealthCheck reporting agent health. May 10 00:44:05.852209 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [OfflineService] Starting document processing engine... May 10 00:44:05.949577 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [OfflineService] [EngineProcessor] Starting May 10 00:44:06.032268 systemd[1]: Started kubelet.service. May 10 00:44:06.033580 systemd[1]: Reached target multi-user.target. May 10 00:44:06.035816 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:44:06.045669 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:44:06.045835 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:44:06.046559 systemd[1]: Startup finished in 588ms (kernel) + 5.822s (initrd) + 9.007s (userspace) = 15.418s. May 10 00:44:06.047609 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [OfflineService] [EngineProcessor] Initial processing May 10 00:44:06.145505 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [OfflineService] Starting message polling May 10 00:44:06.243504 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [OfflineService] Starting send replies to MDS May 10 00:44:06.341722 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [LongRunningPluginsManager] starting long running plugin manager May 10 00:44:06.440198 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 10 00:44:06.538901 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 10 00:44:06.637966 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [StartupProcessor] Executing startup processor tasks May 10 00:44:06.737073 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 10 00:44:06.836205 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 10 00:44:06.935627 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 10 00:44:07.035468 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-06366a3dbcb47db01?role=subscribe&stream=input May 10 00:44:07.135440 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-06366a3dbcb47db01?role=subscribe&stream=input May 10 00:44:07.235439 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] Starting receiving message from control channel May 10 00:44:07.335739 amazon-ssm-agent[1527]: 2025-05-10 00:44:04 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 10 00:44:07.567292 kubelet[1763]: E0510 00:44:07.567234 1763 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:07.569265 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:07.569397 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:07.569626 systemd[1]: kubelet.service: Consumed 1.108s CPU time. May 10 00:44:15.658383 systemd[1]: Started sshd@3-172.31.18.109:22-139.178.89.65:33440.service. May 10 00:44:15.816469 sshd[1771]: Accepted publickey for core from 139.178.89.65 port 33440 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:15.817806 sshd[1771]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:15.822295 systemd-logind[1540]: New session 4 of user core. May 10 00:44:15.822697 systemd[1]: Started session-4.scope. May 10 00:44:15.951242 sshd[1771]: pam_unix(sshd:session): session closed for user core May 10 00:44:15.953952 systemd[1]: sshd@3-172.31.18.109:22-139.178.89.65:33440.service: Deactivated successfully. May 10 00:44:15.954636 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:44:15.955405 systemd-logind[1540]: Session 4 logged out. Waiting for processes to exit. May 10 00:44:15.956246 systemd-logind[1540]: Removed session 4. May 10 00:44:15.977410 systemd[1]: Started sshd@4-172.31.18.109:22-139.178.89.65:33452.service. May 10 00:44:16.140453 sshd[1777]: Accepted publickey for core from 139.178.89.65 port 33452 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:16.142481 sshd[1777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:16.147472 systemd-logind[1540]: New session 5 of user core. May 10 00:44:16.148163 systemd[1]: Started session-5.scope. May 10 00:44:16.273004 sshd[1777]: pam_unix(sshd:session): session closed for user core May 10 00:44:16.276708 systemd[1]: sshd@4-172.31.18.109:22-139.178.89.65:33452.service: Deactivated successfully. May 10 00:44:16.277551 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:44:16.278210 systemd-logind[1540]: Session 5 logged out. Waiting for processes to exit. May 10 00:44:16.279237 systemd-logind[1540]: Removed session 5. May 10 00:44:16.297941 systemd[1]: Started sshd@5-172.31.18.109:22-139.178.89.65:33468.service. May 10 00:44:16.455093 sshd[1783]: Accepted publickey for core from 139.178.89.65 port 33468 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:16.456468 sshd[1783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:16.462052 systemd[1]: Started session-6.scope. May 10 00:44:16.462572 systemd-logind[1540]: New session 6 of user core. May 10 00:44:16.590302 sshd[1783]: pam_unix(sshd:session): session closed for user core May 10 00:44:16.593090 systemd[1]: sshd@5-172.31.18.109:22-139.178.89.65:33468.service: Deactivated successfully. May 10 00:44:16.593758 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:44:16.594317 systemd-logind[1540]: Session 6 logged out. Waiting for processes to exit. May 10 00:44:16.595214 systemd-logind[1540]: Removed session 6. May 10 00:44:16.617962 systemd[1]: Started sshd@6-172.31.18.109:22-139.178.89.65:59338.service. May 10 00:44:16.778580 sshd[1789]: Accepted publickey for core from 139.178.89.65 port 59338 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:16.780365 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:16.785191 systemd-logind[1540]: New session 7 of user core. May 10 00:44:16.785796 systemd[1]: Started session-7.scope. May 10 00:44:16.913495 sudo[1792]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:44:16.913739 sudo[1792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:16.921312 dbus-daemon[1530]: \xd0\xedQZ\u001dV: received setenforce notice (enforcing=-1927221120) May 10 00:44:16.923531 sudo[1792]: pam_unix(sudo:session): session closed for user root May 10 00:44:16.948664 sshd[1789]: pam_unix(sshd:session): session closed for user core May 10 00:44:16.952435 systemd[1]: sshd@6-172.31.18.109:22-139.178.89.65:59338.service: Deactivated successfully. May 10 00:44:16.953434 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:44:16.954195 systemd-logind[1540]: Session 7 logged out. Waiting for processes to exit. May 10 00:44:16.955374 systemd-logind[1540]: Removed session 7. May 10 00:44:16.973188 systemd[1]: Started sshd@7-172.31.18.109:22-139.178.89.65:59354.service. May 10 00:44:17.128779 sshd[1796]: Accepted publickey for core from 139.178.89.65 port 59354 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:17.130163 sshd[1796]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:17.135777 systemd[1]: Started session-8.scope. May 10 00:44:17.136249 systemd-logind[1540]: New session 8 of user core. May 10 00:44:17.240354 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:44:17.240599 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:17.243809 sudo[1800]: pam_unix(sudo:session): session closed for user root May 10 00:44:17.249456 sudo[1799]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:44:17.249694 sudo[1799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:17.260586 systemd[1]: Stopping audit-rules.service... May 10 00:44:17.270299 kernel: kauditd_printk_skb: 170 callbacks suppressed May 10 00:44:17.270440 kernel: audit: type=1305 audit(1746837857.262:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:44:17.270479 kernel: audit: type=1300 audit(1746837857.262:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb955c540 a2=420 a3=0 items=0 ppid=1 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.262000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:44:17.262000 audit[1803]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb955c540 a2=420 a3=0 items=0 ppid=1 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.270688 auditctl[1803]: No rules May 10 00:44:17.263666 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:44:17.263871 systemd[1]: Stopped audit-rules.service. May 10 00:44:17.265896 systemd[1]: Starting audit-rules.service... May 10 00:44:17.262000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:44:17.277361 kernel: audit: type=1327 audit(1746837857.262:199): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:44:17.277476 kernel: audit: type=1131 audit(1746837857.263:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.290425 augenrules[1820]: No rules May 10 00:44:17.291209 systemd[1]: Finished audit-rules.service. May 10 00:44:17.296159 kernel: audit: type=1130 audit(1746837857.291:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.295560 sudo[1799]: pam_unix(sudo:session): session closed for user root May 10 00:44:17.295000 audit[1799]: USER_END pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.295000 audit[1799]: CRED_DISP pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.303635 kernel: audit: type=1106 audit(1746837857.295:202): pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.303700 kernel: audit: type=1104 audit(1746837857.295:203): pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.318034 sshd[1796]: pam_unix(sshd:session): session closed for user core May 10 00:44:17.318000 audit[1796]: USER_END pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.320601 systemd[1]: sshd@7-172.31.18.109:22-139.178.89.65:59354.service: Deactivated successfully. May 10 00:44:17.321481 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:44:17.322710 systemd-logind[1540]: Session 8 logged out. Waiting for processes to exit. May 10 00:44:17.323590 systemd-logind[1540]: Removed session 8. May 10 00:44:17.319000 audit[1796]: CRED_DISP pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.327689 kernel: audit: type=1106 audit(1746837857.318:204): pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.327787 kernel: audit: type=1104 audit(1746837857.319:205): pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.327812 kernel: audit: type=1131 audit(1746837857.319:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.109:22-139.178.89.65:59354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.109:22-139.178.89.65:59354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.109:22-139.178.89.65:59366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.344921 systemd[1]: Started sshd@8-172.31.18.109:22-139.178.89.65:59366.service. May 10 00:44:17.503000 audit[1826]: USER_ACCT pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.504000 audit[1826]: CRED_ACQ pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.504000 audit[1826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff83140520 a2=3 a3=0 items=0 ppid=1 pid=1826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:17.505332 sshd[1826]: Accepted publickey for core from 139.178.89.65 port 59366 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:44:17.505399 sshd[1826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:17.510818 systemd[1]: Started session-9.scope. May 10 00:44:17.511388 systemd-logind[1540]: New session 9 of user core. May 10 00:44:17.516000 audit[1826]: USER_START pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.518000 audit[1828]: CRED_ACQ pid=1828 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:17.616000 audit[1829]: USER_ACCT pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.616000 audit[1829]: CRED_REFR pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.616453 sudo[1829]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:44:17.616686 sudo[1829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:17.617503 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:44:17.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.617739 systemd[1]: Stopped kubelet.service. May 10 00:44:17.617794 systemd[1]: kubelet.service: Consumed 1.108s CPU time. May 10 00:44:17.619308 systemd[1]: Starting kubelet.service... May 10 00:44:17.620000 audit[1829]: USER_START pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:17.653440 systemd[1]: Starting docker.service... May 10 00:44:17.707790 env[1841]: time="2025-05-10T00:44:17.707729673Z" level=info msg="Starting up" May 10 00:44:17.710602 env[1841]: time="2025-05-10T00:44:17.710559625Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:44:17.710602 env[1841]: time="2025-05-10T00:44:17.710597302Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:44:17.710779 env[1841]: time="2025-05-10T00:44:17.710634672Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:44:17.710779 env[1841]: time="2025-05-10T00:44:17.710653462Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:44:17.721230 env[1841]: time="2025-05-10T00:44:17.721153095Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:44:17.721230 env[1841]: time="2025-05-10T00:44:17.721182232Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:44:17.721230 env[1841]: time="2025-05-10T00:44:17.721213420Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:44:17.721230 env[1841]: time="2025-05-10T00:44:17.721233166Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:44:17.733904 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1384913931-merged.mount: Deactivated successfully. May 10 00:44:17.848801 env[1841]: time="2025-05-10T00:44:17.847794067Z" level=info msg="Loading containers: start." May 10 00:44:17.893162 systemd[1]: Started kubelet.service. May 10 00:44:17.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.945000 audit[1880]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1880 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.945000 audit[1880]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe35276240 a2=0 a3=7ffe3527622c items=0 ppid=1841 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:44:17.947000 audit[1882]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.947000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc6f418d70 a2=0 a3=7ffc6f418d5c items=0 ppid=1841 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.947000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:44:17.950000 audit[1884]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.950000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff7f0d1210 a2=0 a3=7fff7f0d11fc items=0 ppid=1841 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:17.952000 audit[1886]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1886 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.952000 audit[1886]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff5a989ee0 a2=0 a3=7fff5a989ecc items=0 ppid=1841 pid=1886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.952000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:17.977015 kubelet[1855]: E0510 00:44:17.976976 1855 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:17.956000 audit[1888]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1888 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.956000 audit[1888]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdaff36580 a2=0 a3=7ffdaff3656c items=0 ppid=1841 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:44:17.982000 audit[1894]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.982000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd90c48020 a2=0 a3=7ffd90c4800c items=0 ppid=1841 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:44:17.983708 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:17.983897 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:17.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:17.993000 audit[1896]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.993000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffb84b52c0 a2=0 a3=7fffb84b52ac items=0 ppid=1841 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:44:17.996000 audit[1898]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.996000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffec7022330 a2=0 a3=7ffec702231c items=0 ppid=1841 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:44:17.998000 audit[1900]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:17.998000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeef0577c0 a2=0 a3=7ffeef0577ac items=0 ppid=1841 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:18.012000 audit[1904]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.012000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc428f1040 a2=0 a3=7ffc428f102c items=0 ppid=1841 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:18.017000 audit[1905]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.017000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdd07a0ff0 a2=0 a3=7ffdd07a0fdc items=0 ppid=1841 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.017000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:18.030111 kernel: Initializing XFRM netlink socket May 10 00:44:18.072435 env[1841]: time="2025-05-10T00:44:18.072394239Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:44:18.075188 (udev-worker)[1852]: Network interface NamePolicy= disabled on kernel command line. May 10 00:44:18.099000 audit[1913]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.099000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffc80a3bb0 a2=0 a3=7fffc80a3b9c items=0 ppid=1841 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:44:18.109000 audit[1916]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.109000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffec00b4a80 a2=0 a3=7ffec00b4a6c items=0 ppid=1841 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:44:18.113000 audit[1919]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.113000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffcd7efbb0 a2=0 a3=7fffcd7efb9c items=0 ppid=1841 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:44:18.115000 audit[1921]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.115000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff6b0980d0 a2=0 a3=7fff6b0980bc items=0 ppid=1841 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:44:18.117000 audit[1923]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.117000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd95b1b9c0 a2=0 a3=7ffd95b1b9ac items=0 ppid=1841 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.117000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:44:18.120000 audit[1925]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.120000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffee11544d0 a2=0 a3=7ffee11544bc items=0 ppid=1841 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:44:18.122000 audit[1927]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.122000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe49119b20 a2=0 a3=7ffe49119b0c items=0 ppid=1841 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:44:18.133000 audit[1930]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.133000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeb8a2e950 a2=0 a3=7ffeb8a2e93c items=0 ppid=1841 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:44:18.136000 audit[1932]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.136000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd0658f720 a2=0 a3=7ffd0658f70c items=0 ppid=1841 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:18.139000 audit[1934]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.139000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcad918430 a2=0 a3=7ffcad91841c items=0 ppid=1841 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:18.141000 audit[1936]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.141000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffccd6f0150 a2=0 a3=7ffccd6f013c items=0 ppid=1841 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:44:18.142405 systemd-networkd[1276]: docker0: Link UP May 10 00:44:18.159000 audit[1940]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1940 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.159000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9254b1a0 a2=0 a3=7fff9254b18c items=0 ppid=1841 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:18.164000 audit[1941]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:18.164000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffa0d1db10 a2=0 a3=7fffa0d1dafc items=0 ppid=1841 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:18.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:18.165129 env[1841]: time="2025-05-10T00:44:18.165073223Z" level=info msg="Loading containers: done." May 10 00:44:18.178756 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1552823046-merged.mount: Deactivated successfully. May 10 00:44:18.193676 env[1841]: time="2025-05-10T00:44:18.193615512Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:44:18.193887 env[1841]: time="2025-05-10T00:44:18.193818705Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:44:18.193988 env[1841]: time="2025-05-10T00:44:18.193958094Z" level=info msg="Daemon has completed initialization" May 10 00:44:18.216393 systemd[1]: Started docker.service. May 10 00:44:18.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:18.222429 env[1841]: time="2025-05-10T00:44:18.222372707Z" level=info msg="API listen on /run/docker.sock" May 10 00:44:19.561039 env[1555]: time="2025-05-10T00:44:19.560987008Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 00:44:20.139915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1066640933.mount: Deactivated successfully. May 10 00:44:21.796093 env[1555]: time="2025-05-10T00:44:21.796021075Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:21.801970 env[1555]: time="2025-05-10T00:44:21.801928756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:21.804267 env[1555]: time="2025-05-10T00:44:21.804234485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:21.806332 env[1555]: time="2025-05-10T00:44:21.806296112Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:21.807182 env[1555]: time="2025-05-10T00:44:21.807150886Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 00:44:21.819409 env[1555]: time="2025-05-10T00:44:21.819361032Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 00:44:23.613242 env[1555]: time="2025-05-10T00:44:23.613166346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:23.616843 env[1555]: time="2025-05-10T00:44:23.616801317Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:23.619164 env[1555]: time="2025-05-10T00:44:23.619131700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:23.623037 env[1555]: time="2025-05-10T00:44:23.622894875Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:23.623879 env[1555]: time="2025-05-10T00:44:23.623845902Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 00:44:23.634124 env[1555]: time="2025-05-10T00:44:23.634060028Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 00:44:24.897258 env[1555]: time="2025-05-10T00:44:24.897189200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.899792 env[1555]: time="2025-05-10T00:44:24.899750574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.902565 env[1555]: time="2025-05-10T00:44:24.902525212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.905816 env[1555]: time="2025-05-10T00:44:24.905770396Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:24.906711 env[1555]: time="2025-05-10T00:44:24.906676259Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 00:44:24.918384 env[1555]: time="2025-05-10T00:44:24.918344529Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:44:26.004616 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1705447529.mount: Deactivated successfully. May 10 00:44:26.659612 amazon-ssm-agent[1527]: 2025-05-10 00:44:26 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 10 00:44:26.687416 env[1555]: time="2025-05-10T00:44:26.687358398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:26.696449 env[1555]: time="2025-05-10T00:44:26.696398686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:26.698536 env[1555]: time="2025-05-10T00:44:26.698491341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:26.700280 env[1555]: time="2025-05-10T00:44:26.700235341Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:26.700949 env[1555]: time="2025-05-10T00:44:26.700904499Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:44:26.712660 env[1555]: time="2025-05-10T00:44:26.712614361Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:44:27.235735 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount119620705.mount: Deactivated successfully. May 10 00:44:28.175018 kernel: kauditd_printk_skb: 88 callbacks suppressed May 10 00:44:28.175179 kernel: audit: type=1130 audit(1746837868.167:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.167702 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:44:28.167965 systemd[1]: Stopped kubelet.service. May 10 00:44:28.174059 systemd[1]: Starting kubelet.service... May 10 00:44:28.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.180152 kernel: audit: type=1131 audit(1746837868.167:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.199132 env[1555]: time="2025-05-10T00:44:28.199053325Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.204210 env[1555]: time="2025-05-10T00:44:28.204159282Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.215251 env[1555]: time="2025-05-10T00:44:28.215205221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.223238 env[1555]: time="2025-05-10T00:44:28.223190906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.224235 env[1555]: time="2025-05-10T00:44:28.224192436Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:44:28.242715 env[1555]: time="2025-05-10T00:44:28.242668197Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 00:44:28.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.385023 systemd[1]: Started kubelet.service. May 10 00:44:28.390255 kernel: audit: type=1130 audit(1746837868.385:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:28.430505 kubelet[2012]: E0510 00:44:28.430407 2012 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:28.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:28.432823 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:28.432949 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:28.437107 kernel: audit: type=1131 audit(1746837868.433:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:28.715479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4239591402.mount: Deactivated successfully. May 10 00:44:28.720826 env[1555]: time="2025-05-10T00:44:28.720767383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.723610 env[1555]: time="2025-05-10T00:44:28.723572470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.725974 env[1555]: time="2025-05-10T00:44:28.725913673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.728372 env[1555]: time="2025-05-10T00:44:28.728336838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:28.728679 env[1555]: time="2025-05-10T00:44:28.728648035Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 00:44:28.739504 env[1555]: time="2025-05-10T00:44:28.739464489Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 00:44:29.223799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount767548455.mount: Deactivated successfully. May 10 00:44:31.511344 env[1555]: time="2025-05-10T00:44:31.511283226Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:31.513752 env[1555]: time="2025-05-10T00:44:31.513715985Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:31.516158 env[1555]: time="2025-05-10T00:44:31.516129723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:31.518812 env[1555]: time="2025-05-10T00:44:31.518776661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:31.519862 env[1555]: time="2025-05-10T00:44:31.519828525Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 00:44:33.944728 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 00:44:33.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.949360 kernel: audit: type=1131 audit(1746837873.944:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:33.976608 kernel: audit: type=1334 audit(1746837873.973:250): prog-id=40 op=UNLOAD May 10 00:44:33.976746 kernel: audit: type=1334 audit(1746837873.973:251): prog-id=39 op=UNLOAD May 10 00:44:33.976781 kernel: audit: type=1334 audit(1746837873.973:252): prog-id=38 op=UNLOAD May 10 00:44:33.973000 audit: BPF prog-id=40 op=UNLOAD May 10 00:44:33.973000 audit: BPF prog-id=39 op=UNLOAD May 10 00:44:33.973000 audit: BPF prog-id=38 op=UNLOAD May 10 00:44:34.239250 systemd[1]: Stopped kubelet.service. May 10 00:44:34.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:34.247974 kernel: audit: type=1130 audit(1746837874.239:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:34.248096 kernel: audit: type=1131 audit(1746837874.243:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:34.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:34.246018 systemd[1]: Starting kubelet.service... May 10 00:44:34.278483 systemd[1]: Reloading. May 10 00:44:34.377495 /usr/lib/systemd/system-generators/torcx-generator[2114]: time="2025-05-10T00:44:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:34.377527 /usr/lib/systemd/system-generators/torcx-generator[2114]: time="2025-05-10T00:44:34Z" level=info msg="torcx already run" May 10 00:44:34.477000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:34.477020 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:34.495356 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:34.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.589413 kernel: audit: type=1400 audit(1746837874.577:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.589563 kernel: audit: type=1400 audit(1746837874.577:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.597198 kernel: audit: type=1400 audit(1746837874.577:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.605102 kernel: audit: type=1400 audit(1746837874.577:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.605000 audit: BPF prog-id=43 op=LOAD May 10 00:44:34.605000 audit: BPF prog-id=24 op=UNLOAD May 10 00:44:34.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.607000 audit: BPF prog-id=44 op=LOAD May 10 00:44:34.607000 audit: BPF prog-id=33 op=UNLOAD May 10 00:44:34.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.609000 audit: BPF prog-id=45 op=LOAD May 10 00:44:34.609000 audit: BPF prog-id=34 op=UNLOAD May 10 00:44:34.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit: BPF prog-id=46 op=LOAD May 10 00:44:34.611000 audit: BPF prog-id=25 op=UNLOAD May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit: BPF prog-id=47 op=LOAD May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.611000 audit: BPF prog-id=48 op=LOAD May 10 00:44:34.611000 audit: BPF prog-id=26 op=UNLOAD May 10 00:44:34.611000 audit: BPF prog-id=27 op=UNLOAD May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit: BPF prog-id=49 op=LOAD May 10 00:44:34.613000 audit: BPF prog-id=35 op=UNLOAD May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit: BPF prog-id=50 op=LOAD May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.614000 audit: BPF prog-id=51 op=LOAD May 10 00:44:34.614000 audit: BPF prog-id=36 op=UNLOAD May 10 00:44:34.614000 audit: BPF prog-id=37 op=UNLOAD May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit: BPF prog-id=52 op=LOAD May 10 00:44:34.615000 audit: BPF prog-id=28 op=UNLOAD May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit: BPF prog-id=53 op=LOAD May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.615000 audit: BPF prog-id=54 op=LOAD May 10 00:44:34.615000 audit: BPF prog-id=29 op=UNLOAD May 10 00:44:34.615000 audit: BPF prog-id=30 op=UNLOAD May 10 00:44:34.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit: BPF prog-id=55 op=LOAD May 10 00:44:34.618000 audit: BPF prog-id=41 op=UNLOAD May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit: BPF prog-id=56 op=LOAD May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:34.618000 audit: BPF prog-id=57 op=LOAD May 10 00:44:34.618000 audit: BPF prog-id=31 op=UNLOAD May 10 00:44:34.618000 audit: BPF prog-id=32 op=UNLOAD May 10 00:44:34.658592 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 00:44:34.658675 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 00:44:34.659031 systemd[1]: Stopped kubelet.service. May 10 00:44:34.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:34.660818 systemd[1]: Starting kubelet.service... May 10 00:44:35.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:35.142191 systemd[1]: Started kubelet.service. May 10 00:44:35.198319 kubelet[2174]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:35.198319 kubelet[2174]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:35.198319 kubelet[2174]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:35.200069 kubelet[2174]: I0510 00:44:35.200003 2174 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:35.644777 kubelet[2174]: I0510 00:44:35.644738 2174 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:35.644777 kubelet[2174]: I0510 00:44:35.644765 2174 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:35.645594 kubelet[2174]: I0510 00:44:35.645534 2174 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:35.677613 kubelet[2174]: I0510 00:44:35.677256 2174 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:35.678182 kubelet[2174]: E0510 00:44:35.678163 2174 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.18.109:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.688456 kubelet[2174]: I0510 00:44:35.688412 2174 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:35.688629 kubelet[2174]: I0510 00:44:35.688604 2174 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:35.688810 kubelet[2174]: I0510 00:44:35.688632 2174 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-18-109","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:35.688919 kubelet[2174]: I0510 00:44:35.688820 2174 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:35.688919 kubelet[2174]: I0510 00:44:35.688831 2174 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:35.688978 kubelet[2174]: I0510 00:44:35.688940 2174 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:35.690066 kubelet[2174]: I0510 00:44:35.690043 2174 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:35.690066 kubelet[2174]: I0510 00:44:35.690065 2174 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:35.690197 kubelet[2174]: I0510 00:44:35.690107 2174 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:35.690197 kubelet[2174]: I0510 00:44:35.690126 2174 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:35.696954 kubelet[2174]: W0510 00:44:35.696666 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.18.109:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.696954 kubelet[2174]: E0510 00:44:35.696721 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.18.109:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.696954 kubelet[2174]: W0510 00:44:35.696778 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.18.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-109&limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.696954 kubelet[2174]: E0510 00:44:35.696804 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.18.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-109&limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.697208 kubelet[2174]: I0510 00:44:35.697004 2174 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:35.703489 kubelet[2174]: I0510 00:44:35.703446 2174 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:35.703629 kubelet[2174]: W0510 00:44:35.703536 2174 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:44:35.704419 kubelet[2174]: I0510 00:44:35.704390 2174 server.go:1264] "Started kubelet" May 10 00:44:35.713005 kubelet[2174]: I0510 00:44:35.712961 2174 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:35.713853 kubelet[2174]: I0510 00:44:35.713824 2174 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:35.725037 kubelet[2174]: I0510 00:44:35.724973 2174 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:35.725000 audit[2174]: AVC avc: denied { mac_admin } for pid=2174 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:35.725000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:35.725000 audit[2174]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b41530 a1=c000af74b8 a2=c000b41500 a3=25 items=0 ppid=1 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:35.726466 kubelet[2174]: I0510 00:44:35.726450 2174 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:35.726544 kubelet[2174]: I0510 00:44:35.725192 2174 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:35.726000 audit[2174]: AVC avc: denied { mac_admin } for pid=2174 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:35.726000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:35.726000 audit[2174]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004d16c0 a1=c0009f8090 a2=c0008ef440 a3=25 items=0 ppid=1 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:35.726941 kubelet[2174]: I0510 00:44:35.726927 2174 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:35.727120 kubelet[2174]: I0510 00:44:35.727101 2174 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:35.731650 kubelet[2174]: E0510 00:44:35.731553 2174 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.18.109:6443/api/v1/namespaces/default/events\": dial tcp 172.31.18.109:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-18-109.183e03caf58e887e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-18-109,UID:ip-172-31-18-109,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-18-109,},FirstTimestamp:2025-05-10 00:44:35.70436723 +0000 UTC m=+0.558164288,LastTimestamp:2025-05-10 00:44:35.70436723 +0000 UTC m=+0.558164288,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-18-109,}" May 10 00:44:35.732000 audit[2185]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.732000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdfe821f00 a2=0 a3=7ffdfe821eec items=0 ppid=2174 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:44:35.734737 kubelet[2174]: I0510 00:44:35.733816 2174 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:35.734737 kubelet[2174]: I0510 00:44:35.733951 2174 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:35.734737 kubelet[2174]: I0510 00:44:35.734001 2174 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:35.734737 kubelet[2174]: W0510 00:44:35.734448 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.18.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.734737 kubelet[2174]: E0510 00:44:35.734505 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.18.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.735135 kubelet[2174]: E0510 00:44:35.735025 2174 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-109?timeout=10s\": dial tcp 172.31.18.109:6443: connect: connection refused" interval="200ms" May 10 00:44:35.735315 kubelet[2174]: E0510 00:44:35.735258 2174 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:44:35.735904 kubelet[2174]: I0510 00:44:35.735884 2174 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:35.735990 kubelet[2174]: I0510 00:44:35.735978 2174 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:35.737000 audit[2186]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.737000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6d9c73a0 a2=0 a3=7fff6d9c738c items=0 ppid=2174 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:44:35.740360 kubelet[2174]: I0510 00:44:35.740329 2174 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:35.758000 audit[2188]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.758000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdfebbb4e0 a2=0 a3=7ffdfebbb4cc items=0 ppid=2174 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:35.760073 kubelet[2174]: I0510 00:44:35.760054 2174 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:35.760189 kubelet[2174]: I0510 00:44:35.760072 2174 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:35.760189 kubelet[2174]: I0510 00:44:35.760108 2174 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:35.762000 audit[2190]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.762000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc55e70a50 a2=0 a3=7ffc55e70a3c items=0 ppid=2174 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:35.763685 kubelet[2174]: I0510 00:44:35.763660 2174 policy_none.go:49] "None policy: Start" May 10 00:44:35.764486 kubelet[2174]: I0510 00:44:35.764461 2174 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:35.764558 kubelet[2174]: I0510 00:44:35.764495 2174 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:35.771181 systemd[1]: Created slice kubepods.slice. May 10 00:44:35.777866 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:44:35.781596 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:44:35.784000 audit[2194]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.784000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff57034c50 a2=0 a3=7fff57034c3c items=0 ppid=2174 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:44:35.785161 kubelet[2174]: I0510 00:44:35.785062 2174 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:35.786000 audit[2197]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:35.786000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd69f37e80 a2=0 a3=7ffd69f37e6c items=0 ppid=2174 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:44:35.786579 kubelet[2174]: I0510 00:44:35.786515 2174 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:35.786579 kubelet[2174]: I0510 00:44:35.786535 2174 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:35.786579 kubelet[2174]: I0510 00:44:35.786553 2174 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:35.786673 kubelet[2174]: E0510 00:44:35.786591 2174 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:35.787872 kubelet[2174]: W0510 00:44:35.787324 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.18.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.787872 kubelet[2174]: E0510 00:44:35.787372 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.18.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:35.788723 kubelet[2174]: I0510 00:44:35.788707 2174 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:35.788000 audit[2174]: AVC avc: denied { mac_admin } for pid=2174 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:35.788000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:35.788000 audit[2174]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002308d0 a1=c000aa74b8 a2=c0002308a0 a3=25 items=0 ppid=1 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.788000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:35.789000 audit[2196]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.789000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc14681db0 a2=0 a3=7ffc14681d9c items=0 ppid=2174 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:44:35.789666 kubelet[2174]: I0510 00:44:35.789113 2174 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:35.789666 kubelet[2174]: I0510 00:44:35.789396 2174 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:35.789666 kubelet[2174]: I0510 00:44:35.789587 2174 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:35.791000 audit[2199]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:35.791000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7e092b50 a2=0 a3=7ffc7e092b3c items=0 ppid=2174 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:44:35.792815 kubelet[2174]: E0510 00:44:35.792795 2174 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-18-109\" not found" May 10 00:44:35.793000 audit[2200]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.793000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6ed87700 a2=0 a3=7fff6ed876ec items=0 ppid=2174 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:44:35.795000 audit[2202]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:35.795000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5d745930 a2=0 a3=7fff5d74591c items=0 ppid=2174 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:44:35.795000 audit[2201]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:35.795000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd43016270 a2=0 a3=7ffd4301625c items=0 ppid=2174 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:44:35.796000 audit[2203]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:35.796000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe26f48c60 a2=0 a3=7ffe26f48c4c items=0 ppid=2174 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:35.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:44:35.835694 kubelet[2174]: I0510 00:44:35.835665 2174 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-109" May 10 00:44:35.836050 kubelet[2174]: E0510 00:44:35.836028 2174 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.109:6443/api/v1/nodes\": dial tcp 172.31.18.109:6443: connect: connection refused" node="ip-172-31-18-109" May 10 00:44:35.887331 kubelet[2174]: I0510 00:44:35.887262 2174 topology_manager.go:215] "Topology Admit Handler" podUID="6747398c3ac995509216a5a6eb7c674a" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-18-109" May 10 00:44:35.888605 kubelet[2174]: I0510 00:44:35.888580 2174 topology_manager.go:215] "Topology Admit Handler" podUID="49726d37d845a77df73dd5f11031cac6" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-18-109" May 10 00:44:35.889765 kubelet[2174]: I0510 00:44:35.889744 2174 topology_manager.go:215] "Topology Admit Handler" podUID="725d1d3ddd6990fd131a751f6b1a96b9" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-18-109" May 10 00:44:35.895170 systemd[1]: Created slice kubepods-burstable-pod6747398c3ac995509216a5a6eb7c674a.slice. May 10 00:44:35.917090 systemd[1]: Created slice kubepods-burstable-pod49726d37d845a77df73dd5f11031cac6.slice. May 10 00:44:35.929208 systemd[1]: Created slice kubepods-burstable-pod725d1d3ddd6990fd131a751f6b1a96b9.slice. May 10 00:44:35.936031 kubelet[2174]: E0510 00:44:35.935988 2174 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-109?timeout=10s\": dial tcp 172.31.18.109:6443: connect: connection refused" interval="400ms" May 10 00:44:36.035359 kubelet[2174]: I0510 00:44:36.035302 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:36.035359 kubelet[2174]: I0510 00:44:36.035348 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6747398c3ac995509216a5a6eb7c674a-ca-certs\") pod \"kube-apiserver-ip-172-31-18-109\" (UID: \"6747398c3ac995509216a5a6eb7c674a\") " pod="kube-system/kube-apiserver-ip-172-31-18-109" May 10 00:44:36.035359 kubelet[2174]: I0510 00:44:36.035372 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-ca-certs\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:36.035574 kubelet[2174]: I0510 00:44:36.035388 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:36.035574 kubelet[2174]: I0510 00:44:36.035408 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-k8s-certs\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:36.035574 kubelet[2174]: I0510 00:44:36.035428 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-kubeconfig\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:36.035574 kubelet[2174]: I0510 00:44:36.035444 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/725d1d3ddd6990fd131a751f6b1a96b9-kubeconfig\") pod \"kube-scheduler-ip-172-31-18-109\" (UID: \"725d1d3ddd6990fd131a751f6b1a96b9\") " pod="kube-system/kube-scheduler-ip-172-31-18-109" May 10 00:44:36.035574 kubelet[2174]: I0510 00:44:36.035457 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6747398c3ac995509216a5a6eb7c674a-k8s-certs\") pod \"kube-apiserver-ip-172-31-18-109\" (UID: \"6747398c3ac995509216a5a6eb7c674a\") " pod="kube-system/kube-apiserver-ip-172-31-18-109" May 10 00:44:36.035713 kubelet[2174]: I0510 00:44:36.035474 2174 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6747398c3ac995509216a5a6eb7c674a-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-18-109\" (UID: \"6747398c3ac995509216a5a6eb7c674a\") " pod="kube-system/kube-apiserver-ip-172-31-18-109" May 10 00:44:36.037539 kubelet[2174]: I0510 00:44:36.037513 2174 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-109" May 10 00:44:36.037813 kubelet[2174]: E0510 00:44:36.037787 2174 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.109:6443/api/v1/nodes\": dial tcp 172.31.18.109:6443: connect: connection refused" node="ip-172-31-18-109" May 10 00:44:36.215475 env[1555]: time="2025-05-10T00:44:36.215433696Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-18-109,Uid:6747398c3ac995509216a5a6eb7c674a,Namespace:kube-system,Attempt:0,}" May 10 00:44:36.221042 env[1555]: time="2025-05-10T00:44:36.220993163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-18-109,Uid:49726d37d845a77df73dd5f11031cac6,Namespace:kube-system,Attempt:0,}" May 10 00:44:36.233191 env[1555]: time="2025-05-10T00:44:36.233143738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-18-109,Uid:725d1d3ddd6990fd131a751f6b1a96b9,Namespace:kube-system,Attempt:0,}" May 10 00:44:36.337179 kubelet[2174]: E0510 00:44:36.337122 2174 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-109?timeout=10s\": dial tcp 172.31.18.109:6443: connect: connection refused" interval="800ms" May 10 00:44:36.440315 kubelet[2174]: I0510 00:44:36.440283 2174 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-109" May 10 00:44:36.440643 kubelet[2174]: E0510 00:44:36.440611 2174 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.109:6443/api/v1/nodes\": dial tcp 172.31.18.109:6443: connect: connection refused" node="ip-172-31-18-109" May 10 00:44:36.671409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount659710002.mount: Deactivated successfully. May 10 00:44:36.677185 env[1555]: time="2025-05-10T00:44:36.677121838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.681796 env[1555]: time="2025-05-10T00:44:36.681759763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.683300 env[1555]: time="2025-05-10T00:44:36.683259579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.684912 env[1555]: time="2025-05-10T00:44:36.684859128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.687660 env[1555]: time="2025-05-10T00:44:36.687622219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.689900 env[1555]: time="2025-05-10T00:44:36.689864065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.691501 env[1555]: time="2025-05-10T00:44:36.691465601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.692888 env[1555]: time="2025-05-10T00:44:36.692859121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.696621 kubelet[2174]: W0510 00:44:36.696553 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.18.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-109&limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.696764 kubelet[2174]: E0510 00:44:36.696628 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.18.109:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-109&limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.700754 env[1555]: time="2025-05-10T00:44:36.700717810Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.703803 env[1555]: time="2025-05-10T00:44:36.703763419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.705582 env[1555]: time="2025-05-10T00:44:36.705540047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.707770 env[1555]: time="2025-05-10T00:44:36.707744600Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:36.737791 env[1555]: time="2025-05-10T00:44:36.737724656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:36.737791 env[1555]: time="2025-05-10T00:44:36.737760200Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:36.737982 env[1555]: time="2025-05-10T00:44:36.737788153Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:36.737982 env[1555]: time="2025-05-10T00:44:36.737910873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a55d21a1eecbce0e51a4a930bc346bd2054028dd3f8fc545db914f897af9d1ab pid=2212 runtime=io.containerd.runc.v2 May 10 00:44:36.750354 env[1555]: time="2025-05-10T00:44:36.749281920Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:36.750354 env[1555]: time="2025-05-10T00:44:36.749391698Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:36.750354 env[1555]: time="2025-05-10T00:44:36.749427358Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:36.750354 env[1555]: time="2025-05-10T00:44:36.749684653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932 pid=2231 runtime=io.containerd.runc.v2 May 10 00:44:36.770236 systemd[1]: Started cri-containerd-a55d21a1eecbce0e51a4a930bc346bd2054028dd3f8fc545db914f897af9d1ab.scope. May 10 00:44:36.792016 env[1555]: time="2025-05-10T00:44:36.791779652Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:36.792016 env[1555]: time="2025-05-10T00:44:36.791827352Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:36.792016 env[1555]: time="2025-05-10T00:44:36.791842009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:36.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.793000 audit: BPF prog-id=58 op=LOAD May 10 00:44:36.795486 env[1555]: time="2025-05-10T00:44:36.792567483Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a pid=2264 runtime=io.containerd.runc.v2 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356432316131656563626365306535316134613933306263333436 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356432316131656563626365306535316134613933306263333436 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit: BPF prog-id=59 op=LOAD May 10 00:44:36.794000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d01e0 items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356432316131656563626365306535316134613933306263333436 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.794000 audit: BPF prog-id=60 op=LOAD May 10 00:44:36.794000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d0228 items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356432316131656563626365306535316134613933306263333436 May 10 00:44:36.794000 audit: BPF prog-id=60 op=UNLOAD May 10 00:44:36.794000 audit: BPF prog-id=59 op=UNLOAD May 10 00:44:36.795000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { perfmon } for pid=2230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit[2230]: AVC avc: denied { bpf } for pid=2230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.795000 audit: BPF prog-id=61 op=LOAD May 10 00:44:36.795000 audit[2230]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d0638 items=0 ppid=2212 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135356432316131656563626365306535316134613933306263333436 May 10 00:44:36.806830 systemd[1]: Started cri-containerd-7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932.scope. May 10 00:44:36.824350 systemd[1]: Started cri-containerd-eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a.scope. May 10 00:44:36.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.852000 audit: BPF prog-id=62 op=LOAD May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001d5c48 a2=10 a3=1c items=0 ppid=2231 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313136653432363137656263313461613266663266313962363332 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001d56b0 a2=3c a3=c items=0 ppid=2231 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313136653432363137656263313461613266663266313962363332 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit: BPF prog-id=63 op=LOAD May 10 00:44:36.853000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001d59d8 a2=78 a3=c00030a520 items=0 ppid=2231 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313136653432363137656263313461613266663266313962363332 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit: BPF prog-id=64 op=LOAD May 10 00:44:36.853000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001d5770 a2=78 a3=c00030a568 items=0 ppid=2231 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313136653432363137656263313461613266663266313962363332 May 10 00:44:36.853000 audit: BPF prog-id=64 op=UNLOAD May 10 00:44:36.853000 audit: BPF prog-id=63 op=UNLOAD May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.853000 audit: BPF prog-id=65 op=LOAD May 10 00:44:36.853000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001d5c30 a2=78 a3=c00030a978 items=0 ppid=2231 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762313136653432363137656263313461613266663266313962363332 May 10 00:44:36.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.871000 audit: BPF prog-id=66 op=LOAD May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2264 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333662336566633633353439376535616432333333613736633065 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2264 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333662336566633633353439376535616432333333613736633065 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit: BPF prog-id=67 op=LOAD May 10 00:44:36.872000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028af40 items=0 ppid=2264 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333662336566633633353439376535616432333333613736633065 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit: BPF prog-id=68 op=LOAD May 10 00:44:36.872000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028af88 items=0 ppid=2264 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333662336566633633353439376535616432333333613736633065 May 10 00:44:36.872000 audit: BPF prog-id=68 op=UNLOAD May 10 00:44:36.872000 audit: BPF prog-id=67 op=UNLOAD May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:36.872000 audit: BPF prog-id=69 op=LOAD May 10 00:44:36.872000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b398 items=0 ppid=2264 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:36.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562333662336566633633353439376535616432333333613736633065 May 10 00:44:36.879447 env[1555]: time="2025-05-10T00:44:36.879400636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-18-109,Uid:6747398c3ac995509216a5a6eb7c674a,Namespace:kube-system,Attempt:0,} returns sandbox id \"a55d21a1eecbce0e51a4a930bc346bd2054028dd3f8fc545db914f897af9d1ab\"" May 10 00:44:36.885145 kubelet[2174]: W0510 00:44:36.884983 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.18.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.885303 kubelet[2174]: E0510 00:44:36.885248 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.18.109:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.887028 env[1555]: time="2025-05-10T00:44:36.886979631Z" level=info msg="CreateContainer within sandbox \"a55d21a1eecbce0e51a4a930bc346bd2054028dd3f8fc545db914f897af9d1ab\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:44:36.908112 kubelet[2174]: W0510 00:44:36.907805 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.18.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.908112 kubelet[2174]: E0510 00:44:36.907870 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.18.109:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.913429 kubelet[2174]: W0510 00:44:36.913350 2174 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.18.109:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.913571 kubelet[2174]: E0510 00:44:36.913449 2174 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.18.109:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:36.913686 env[1555]: time="2025-05-10T00:44:36.913643109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-18-109,Uid:49726d37d845a77df73dd5f11031cac6,Namespace:kube-system,Attempt:0,} returns sandbox id \"7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932\"" May 10 00:44:36.917141 env[1555]: time="2025-05-10T00:44:36.917071280Z" level=info msg="CreateContainer within sandbox \"7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:44:36.935383 env[1555]: time="2025-05-10T00:44:36.929173235Z" level=info msg="CreateContainer within sandbox \"a55d21a1eecbce0e51a4a930bc346bd2054028dd3f8fc545db914f897af9d1ab\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fac3ef02a154912d7fb5b004e5aa5edda55b4301224fdc9834960d5bd4c5ab6b\"" May 10 00:44:36.936375 env[1555]: time="2025-05-10T00:44:36.936336517Z" level=info msg="StartContainer for \"fac3ef02a154912d7fb5b004e5aa5edda55b4301224fdc9834960d5bd4c5ab6b\"" May 10 00:44:36.943343 env[1555]: time="2025-05-10T00:44:36.943276746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-18-109,Uid:725d1d3ddd6990fd131a751f6b1a96b9,Namespace:kube-system,Attempt:0,} returns sandbox id \"eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a\"" May 10 00:44:36.947165 env[1555]: time="2025-05-10T00:44:36.947115769Z" level=info msg="CreateContainer within sandbox \"eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:44:36.949503 env[1555]: time="2025-05-10T00:44:36.949458528Z" level=info msg="CreateContainer within sandbox \"7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29\"" May 10 00:44:36.950414 env[1555]: time="2025-05-10T00:44:36.950371967Z" level=info msg="StartContainer for \"1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29\"" May 10 00:44:36.965772 systemd[1]: Started cri-containerd-fac3ef02a154912d7fb5b004e5aa5edda55b4301224fdc9834960d5bd4c5ab6b.scope. May 10 00:44:36.980612 env[1555]: time="2025-05-10T00:44:36.980538247Z" level=info msg="CreateContainer within sandbox \"eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195\"" May 10 00:44:36.981892 env[1555]: time="2025-05-10T00:44:36.981856459Z" level=info msg="StartContainer for \"c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195\"" May 10 00:44:36.990515 systemd[1]: Started cri-containerd-1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29.scope. May 10 00:44:37.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.010000 audit: BPF prog-id=70 op=LOAD May 10 00:44:37.011000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.011000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2212 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633365663032613135343931326437666235623030346535616135 May 10 00:44:37.011000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.011000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2212 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633365663032613135343931326437666235623030346535616135 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.012000 audit: BPF prog-id=71 op=LOAD May 10 00:44:37.012000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000400050 items=0 ppid=2212 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633365663032613135343931326437666235623030346535616135 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.013000 audit: BPF prog-id=72 op=LOAD May 10 00:44:37.013000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000400098 items=0 ppid=2212 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633365663032613135343931326437666235623030346535616135 May 10 00:44:37.014000 audit: BPF prog-id=72 op=UNLOAD May 10 00:44:37.014000 audit: BPF prog-id=71 op=UNLOAD May 10 00:44:37.015000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.015000 audit: BPF prog-id=73 op=LOAD May 10 00:44:37.015000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0004004a8 items=0 ppid=2212 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661633365663032613135343931326437666235623030346535616135 May 10 00:44:37.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.018000 audit: BPF prog-id=74 op=LOAD May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2231 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135343036363361343664613564353435613935343234616437393863 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2231 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135343036363361343664613564353435613935343234616437393863 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit: BPF prog-id=75 op=LOAD May 10 00:44:37.019000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000299480 items=0 ppid=2231 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135343036363361343664613564353435613935343234616437393863 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit: BPF prog-id=76 op=LOAD May 10 00:44:37.019000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002994c8 items=0 ppid=2231 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135343036363361343664613564353435613935343234616437393863 May 10 00:44:37.019000 audit: BPF prog-id=76 op=UNLOAD May 10 00:44:37.019000 audit: BPF prog-id=75 op=UNLOAD May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.019000 audit: BPF prog-id=77 op=LOAD May 10 00:44:37.019000 audit[2359]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002998d8 items=0 ppid=2231 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135343036363361343664613564353435613935343234616437393863 May 10 00:44:37.045586 systemd[1]: Started cri-containerd-c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195.scope. May 10 00:44:37.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.085000 audit: BPF prog-id=78 op=LOAD May 10 00:44:37.087000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.087000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2264 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323364343132663139363838613730343039656566313730353431 May 10 00:44:37.087000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.087000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2264 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323364343132663139363838613730343039656566313730353431 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.088000 audit: BPF prog-id=79 op=LOAD May 10 00:44:37.088000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029dc30 items=0 ppid=2264 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323364343132663139363838613730343039656566313730353431 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.089000 audit: BPF prog-id=80 op=LOAD May 10 00:44:37.089000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029dc78 items=0 ppid=2264 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323364343132663139363838613730343039656566313730353431 May 10 00:44:37.090000 audit: BPF prog-id=80 op=UNLOAD May 10 00:44:37.090000 audit: BPF prog-id=79 op=UNLOAD May 10 00:44:37.090000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:37.090000 audit: BPF prog-id=81 op=LOAD May 10 00:44:37.090000 audit[2390]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ba088 items=0 ppid=2264 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:37.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332323364343132663139363838613730343039656566313730353431 May 10 00:44:37.107311 env[1555]: time="2025-05-10T00:44:37.107257095Z" level=info msg="StartContainer for \"fac3ef02a154912d7fb5b004e5aa5edda55b4301224fdc9834960d5bd4c5ab6b\" returns successfully" May 10 00:44:37.113680 env[1555]: time="2025-05-10T00:44:37.113628037Z" level=info msg="StartContainer for \"1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29\" returns successfully" May 10 00:44:37.137801 kubelet[2174]: E0510 00:44:37.137756 2174 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-109?timeout=10s\": dial tcp 172.31.18.109:6443: connect: connection refused" interval="1.6s" May 10 00:44:37.140517 env[1555]: time="2025-05-10T00:44:37.140468706Z" level=info msg="StartContainer for \"c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195\" returns successfully" May 10 00:44:37.242847 kubelet[2174]: I0510 00:44:37.242264 2174 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-109" May 10 00:44:37.242847 kubelet[2174]: E0510 00:44:37.242742 2174 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.109:6443/api/v1/nodes\": dial tcp 172.31.18.109:6443: connect: connection refused" node="ip-172-31-18-109" May 10 00:44:37.757056 kubelet[2174]: E0510 00:44:37.757024 2174 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.18.109:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.18.109:6443: connect: connection refused May 10 00:44:38.544000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.544000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00040c780 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:38.544000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.545000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:38.545000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c001264e40 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:38.545000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:38.846714 kubelet[2174]: I0510 00:44:38.846618 2174 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-109" May 10 00:44:39.649971 kernel: kauditd_printk_skb: 566 callbacks suppressed May 10 00:44:39.650150 kernel: audit: type=1400 audit(1746837879.637:554): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.637000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.637000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006afbd10 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.661419 kernel: audit: type=1300 audit(1746837879.637:554): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006afbd10 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.637000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.683003 kernel: audit: type=1327 audit(1746837879.637:554): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.683167 kernel: audit: type=1400 audit(1746837879.639:555): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.639000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.639000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c003d8c5a0 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.703185 kernel: audit: type=1300 audit(1746837879.639:555): arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c003d8c5a0 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.723615 kernel: audit: type=1327 audit(1746837879.639:555): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.723730 kernel: audit: type=1400 audit(1746837879.639:556): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.639000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.735647 kernel: audit: type=1300 audit(1746837879.639:556): arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c007209a60 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.639000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c007209a60 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.747007 kernel: audit: type=1327 audit(1746837879.639:556): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.642000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.642000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0066c41e0 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.642000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.727000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.727000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c004021c80 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.727000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.727000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.727000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c007403950 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:44:39.727000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:44:39.759113 kernel: audit: type=1400 audit(1746837879.642:557): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:39.832021 kubelet[2174]: E0510 00:44:39.831977 2174 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-18-109\" not found" node="ip-172-31-18-109" May 10 00:44:39.937253 kubelet[2174]: I0510 00:44:39.937215 2174 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-18-109" May 10 00:44:40.698636 kubelet[2174]: I0510 00:44:40.698603 2174 apiserver.go:52] "Watching apiserver" May 10 00:44:40.735002 kubelet[2174]: I0510 00:44:40.734946 2174 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:42.099883 systemd[1]: Reloading. May 10 00:44:42.185504 /usr/lib/systemd/system-generators/torcx-generator[2467]: time="2025-05-10T00:44:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:42.185941 /usr/lib/systemd/system-generators/torcx-generator[2467]: time="2025-05-10T00:44:42Z" level=info msg="torcx already run" May 10 00:44:42.286973 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:42.287002 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:42.306966 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.403000 audit: BPF prog-id=82 op=LOAD May 10 00:44:42.403000 audit: BPF prog-id=43 op=UNLOAD May 10 00:44:42.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.405000 audit: BPF prog-id=83 op=LOAD May 10 00:44:42.405000 audit: BPF prog-id=66 op=UNLOAD May 10 00:44:42.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.406000 audit: BPF prog-id=84 op=LOAD May 10 00:44:42.406000 audit: BPF prog-id=44 op=UNLOAD May 10 00:44:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.407000 audit: BPF prog-id=85 op=LOAD May 10 00:44:42.407000 audit: BPF prog-id=62 op=UNLOAD May 10 00:44:42.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.409000 audit: BPF prog-id=86 op=LOAD May 10 00:44:42.409000 audit: BPF prog-id=45 op=UNLOAD May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit: BPF prog-id=87 op=LOAD May 10 00:44:42.412000 audit: BPF prog-id=46 op=UNLOAD May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit: BPF prog-id=88 op=LOAD May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.412000 audit: BPF prog-id=89 op=LOAD May 10 00:44:42.412000 audit: BPF prog-id=47 op=UNLOAD May 10 00:44:42.412000 audit: BPF prog-id=48 op=UNLOAD May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit: BPF prog-id=90 op=LOAD May 10 00:44:42.414000 audit: BPF prog-id=49 op=UNLOAD May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit: BPF prog-id=91 op=LOAD May 10 00:44:42.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.415000 audit: BPF prog-id=92 op=LOAD May 10 00:44:42.415000 audit: BPF prog-id=50 op=UNLOAD May 10 00:44:42.415000 audit: BPF prog-id=51 op=UNLOAD May 10 00:44:42.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.416000 audit: BPF prog-id=93 op=LOAD May 10 00:44:42.416000 audit: BPF prog-id=52 op=UNLOAD May 10 00:44:42.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit: BPF prog-id=94 op=LOAD May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit: BPF prog-id=95 op=LOAD May 10 00:44:42.417000 audit: BPF prog-id=53 op=UNLOAD May 10 00:44:42.417000 audit: BPF prog-id=54 op=UNLOAD May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.417000 audit: BPF prog-id=96 op=LOAD May 10 00:44:42.417000 audit: BPF prog-id=70 op=UNLOAD May 10 00:44:42.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.420000 audit: BPF prog-id=97 op=LOAD May 10 00:44:42.420000 audit: BPF prog-id=55 op=UNLOAD May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit: BPF prog-id=98 op=LOAD May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.421000 audit: BPF prog-id=99 op=LOAD May 10 00:44:42.421000 audit: BPF prog-id=56 op=UNLOAD May 10 00:44:42.421000 audit: BPF prog-id=57 op=UNLOAD May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit: BPF prog-id=100 op=LOAD May 10 00:44:42.423000 audit: BPF prog-id=78 op=UNLOAD May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.424000 audit: BPF prog-id=101 op=LOAD May 10 00:44:42.424000 audit: BPF prog-id=74 op=UNLOAD May 10 00:44:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:42.425000 audit: BPF prog-id=102 op=LOAD May 10 00:44:42.425000 audit: BPF prog-id=58 op=UNLOAD May 10 00:44:42.454188 kubelet[2174]: E0510 00:44:42.453422 2174 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ip-172-31-18-109.183e03caf58e887e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-18-109,UID:ip-172-31-18-109,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-18-109,},FirstTimestamp:2025-05-10 00:44:35.70436723 +0000 UTC m=+0.558164288,LastTimestamp:2025-05-10 00:44:35.70436723 +0000 UTC m=+0.558164288,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-18-109,}" May 10 00:44:42.453962 systemd[1]: Stopping kubelet.service... May 10 00:44:42.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.477546 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:44:42.477785 systemd[1]: Stopped kubelet.service. May 10 00:44:42.477866 systemd[1]: kubelet.service: Consumed 1.019s CPU time. May 10 00:44:42.481749 systemd[1]: Starting kubelet.service... May 10 00:44:42.539000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:44:42.539000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000adecc0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:42.539000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:43.615393 systemd[1]: Started kubelet.service. May 10 00:44:43.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:43.715976 kubelet[2527]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:43.716380 kubelet[2527]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:43.716433 kubelet[2527]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:43.716562 kubelet[2527]: I0510 00:44:43.716535 2527 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:43.724191 kubelet[2527]: I0510 00:44:43.724139 2527 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:43.724191 kubelet[2527]: I0510 00:44:43.724164 2527 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:43.724388 kubelet[2527]: I0510 00:44:43.724371 2527 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:43.727806 kubelet[2527]: I0510 00:44:43.725602 2527 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:44:43.727806 kubelet[2527]: I0510 00:44:43.727398 2527 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:43.739700 kubelet[2527]: I0510 00:44:43.738819 2527 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:43.739700 kubelet[2527]: I0510 00:44:43.739008 2527 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:43.739700 kubelet[2527]: I0510 00:44:43.739033 2527 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-18-109","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:43.739700 kubelet[2527]: I0510 00:44:43.739216 2527 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:43.739960 kubelet[2527]: I0510 00:44:43.739227 2527 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:43.739960 kubelet[2527]: I0510 00:44:43.739296 2527 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:43.749643 kubelet[2527]: I0510 00:44:43.749585 2527 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:43.749643 kubelet[2527]: I0510 00:44:43.749641 2527 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:43.749809 kubelet[2527]: I0510 00:44:43.749665 2527 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:43.749809 kubelet[2527]: I0510 00:44:43.749677 2527 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:43.753000 audit[2527]: AVC avc: denied { mac_admin } for pid=2527 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:43.753000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:43.753000 audit[2527]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006a2330 a1=c000731e00 a2=c0006a2300 a3=25 items=0 ppid=1 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:43.753000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:43.753000 audit[2527]: AVC avc: denied { mac_admin } for pid=2527 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:43.753000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:43.753000 audit[2527]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a28ba0 a1=c000731e18 a2=c0006a23c0 a3=25 items=0 ppid=1 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:43.753000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:43.758670 kubelet[2527]: I0510 00:44:43.751243 2527 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:43.758670 kubelet[2527]: I0510 00:44:43.751539 2527 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:43.758670 kubelet[2527]: I0510 00:44:43.752118 2527 server.go:1264] "Started kubelet" May 10 00:44:43.758670 kubelet[2527]: I0510 00:44:43.754808 2527 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:43.758670 kubelet[2527]: I0510 00:44:43.754840 2527 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:43.758670 kubelet[2527]: I0510 00:44:43.754875 2527 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:43.768059 kubelet[2527]: I0510 00:44:43.764070 2527 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:43.768059 kubelet[2527]: I0510 00:44:43.765474 2527 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:43.768059 kubelet[2527]: I0510 00:44:43.766878 2527 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:43.768059 kubelet[2527]: I0510 00:44:43.767131 2527 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:43.770966 kubelet[2527]: I0510 00:44:43.769626 2527 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:43.779384 kubelet[2527]: I0510 00:44:43.778390 2527 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:43.779384 kubelet[2527]: I0510 00:44:43.778559 2527 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:43.783797 kubelet[2527]: I0510 00:44:43.783749 2527 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:43.787587 kubelet[2527]: I0510 00:44:43.787065 2527 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:43.787587 kubelet[2527]: I0510 00:44:43.787159 2527 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:43.787587 kubelet[2527]: I0510 00:44:43.787184 2527 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:43.787587 kubelet[2527]: E0510 00:44:43.787239 2527 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:43.824654 kubelet[2527]: I0510 00:44:43.824624 2527 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:43.824654 kubelet[2527]: I0510 00:44:43.824649 2527 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:43.824840 kubelet[2527]: I0510 00:44:43.824732 2527 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:43.877630 kubelet[2527]: I0510 00:44:43.874853 2527 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-109" May 10 00:44:43.902901 kubelet[2527]: I0510 00:44:43.902868 2527 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:43.902901 kubelet[2527]: I0510 00:44:43.902887 2527 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:43.902901 kubelet[2527]: I0510 00:44:43.902908 2527 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:43.903338 kubelet[2527]: I0510 00:44:43.903324 2527 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:44:43.903388 kubelet[2527]: I0510 00:44:43.903340 2527 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:44:43.903388 kubelet[2527]: I0510 00:44:43.903372 2527 policy_none.go:49] "None policy: Start" May 10 00:44:43.904735 kubelet[2527]: I0510 00:44:43.904422 2527 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:43.904735 kubelet[2527]: I0510 00:44:43.904446 2527 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:43.904735 kubelet[2527]: I0510 00:44:43.904615 2527 state_mem.go:75] "Updated machine memory state" May 10 00:44:43.905547 kubelet[2527]: E0510 00:44:43.905525 2527 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:44:43.910000 audit[2527]: AVC avc: denied { mac_admin } for pid=2527 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:43.910000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:43.910000 audit[2527]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b83ec0 a1=c000fbf098 a2=c000b83e90 a3=25 items=0 ppid=1 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:43.910000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:43.915795 kubelet[2527]: I0510 00:44:43.911664 2527 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:43.915795 kubelet[2527]: I0510 00:44:43.911725 2527 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:43.915795 kubelet[2527]: I0510 00:44:43.911881 2527 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:43.915795 kubelet[2527]: I0510 00:44:43.911982 2527 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:43.930662 kubelet[2527]: I0510 00:44:43.930624 2527 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-18-109" May 10 00:44:43.930787 kubelet[2527]: I0510 00:44:43.930703 2527 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-18-109" May 10 00:44:44.106641 kubelet[2527]: I0510 00:44:44.106568 2527 topology_manager.go:215] "Topology Admit Handler" podUID="6747398c3ac995509216a5a6eb7c674a" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-18-109" May 10 00:44:44.106825 kubelet[2527]: I0510 00:44:44.106687 2527 topology_manager.go:215] "Topology Admit Handler" podUID="49726d37d845a77df73dd5f11031cac6" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-18-109" May 10 00:44:44.106825 kubelet[2527]: I0510 00:44:44.106736 2527 topology_manager.go:215] "Topology Admit Handler" podUID="725d1d3ddd6990fd131a751f6b1a96b9" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-18-109" May 10 00:44:44.188819 kubelet[2527]: I0510 00:44:44.186860 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6747398c3ac995509216a5a6eb7c674a-k8s-certs\") pod \"kube-apiserver-ip-172-31-18-109\" (UID: \"6747398c3ac995509216a5a6eb7c674a\") " pod="kube-system/kube-apiserver-ip-172-31-18-109" May 10 00:44:44.188819 kubelet[2527]: I0510 00:44:44.186901 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-ca-certs\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:44.188819 kubelet[2527]: I0510 00:44:44.186925 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-k8s-certs\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:44.188819 kubelet[2527]: I0510 00:44:44.186940 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-kubeconfig\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:44.188819 kubelet[2527]: I0510 00:44:44.186959 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6747398c3ac995509216a5a6eb7c674a-ca-certs\") pod \"kube-apiserver-ip-172-31-18-109\" (UID: \"6747398c3ac995509216a5a6eb7c674a\") " pod="kube-system/kube-apiserver-ip-172-31-18-109" May 10 00:44:44.189117 kubelet[2527]: I0510 00:44:44.186975 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6747398c3ac995509216a5a6eb7c674a-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-18-109\" (UID: \"6747398c3ac995509216a5a6eb7c674a\") " pod="kube-system/kube-apiserver-ip-172-31-18-109" May 10 00:44:44.189117 kubelet[2527]: I0510 00:44:44.186992 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:44.189117 kubelet[2527]: I0510 00:44:44.187009 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/49726d37d845a77df73dd5f11031cac6-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-18-109\" (UID: \"49726d37d845a77df73dd5f11031cac6\") " pod="kube-system/kube-controller-manager-ip-172-31-18-109" May 10 00:44:44.189117 kubelet[2527]: I0510 00:44:44.187025 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/725d1d3ddd6990fd131a751f6b1a96b9-kubeconfig\") pod \"kube-scheduler-ip-172-31-18-109\" (UID: \"725d1d3ddd6990fd131a751f6b1a96b9\") " pod="kube-system/kube-scheduler-ip-172-31-18-109" May 10 00:44:44.751072 kubelet[2527]: I0510 00:44:44.751026 2527 apiserver.go:52] "Watching apiserver" May 10 00:44:44.779148 kubelet[2527]: I0510 00:44:44.779108 2527 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:44.930799 kubelet[2527]: I0510 00:44:44.930727 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-18-109" podStartSLOduration=0.930691729 podStartE2EDuration="930.691729ms" podCreationTimestamp="2025-05-10 00:44:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:44.91626844 +0000 UTC m=+1.264988619" watchObservedRunningTime="2025-05-10 00:44:44.930691729 +0000 UTC m=+1.279411909" May 10 00:44:44.947147 kubelet[2527]: I0510 00:44:44.947069 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-18-109" podStartSLOduration=0.947049172 podStartE2EDuration="947.049172ms" podCreationTimestamp="2025-05-10 00:44:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:44.931962887 +0000 UTC m=+1.280683067" watchObservedRunningTime="2025-05-10 00:44:44.947049172 +0000 UTC m=+1.295769348" May 10 00:44:44.974008 kubelet[2527]: I0510 00:44:44.973939 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-18-109" podStartSLOduration=0.97391604 podStartE2EDuration="973.91604ms" podCreationTimestamp="2025-05-10 00:44:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:44.948828549 +0000 UTC m=+1.297548734" watchObservedRunningTime="2025-05-10 00:44:44.97391604 +0000 UTC m=+1.322636219" May 10 00:44:48.628987 update_engine[1542]: I0510 00:44:48.628931 1542 update_attempter.cc:509] Updating boot flags... May 10 00:44:49.499039 sudo[1829]: pam_unix(sudo:session): session closed for user root May 10 00:44:49.498000 audit[1829]: USER_END pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:49.500864 kernel: kauditd_printk_skb: 269 callbacks suppressed May 10 00:44:49.500988 kernel: audit: type=1106 audit(1746837889.498:810): pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:49.501000 audit[1829]: CRED_DISP pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:49.512764 kernel: audit: type=1104 audit(1746837889.501:811): pid=1829 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:49.532505 sshd[1826]: pam_unix(sshd:session): session closed for user core May 10 00:44:49.533000 audit[1826]: USER_END pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:49.536858 systemd[1]: sshd@8-172.31.18.109:22-139.178.89.65:59366.service: Deactivated successfully. May 10 00:44:49.537872 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:44:49.538042 systemd[1]: session-9.scope: Consumed 4.700s CPU time. May 10 00:44:49.539861 systemd-logind[1540]: Session 9 logged out. Waiting for processes to exit. May 10 00:44:49.541393 systemd-logind[1540]: Removed session 9. May 10 00:44:49.533000 audit[1826]: CRED_DISP pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:49.551787 kernel: audit: type=1106 audit(1746837889.533:812): pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:49.551912 kernel: audit: type=1104 audit(1746837889.533:813): pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:44:49.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.109:22-139.178.89.65:59366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.558110 kernel: audit: type=1131 audit(1746837889.536:814): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.109:22-139.178.89.65:59366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:55.463000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.463000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc8080 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.479461 kernel: audit: type=1400 audit(1746837895.463:815): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.479588 kernel: audit: type=1300 audit(1746837895.463:815): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc8080 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.487189 kernel: audit: type=1327 audit(1746837895.463:815): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.463000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.493566 kernel: audit: type=1400 audit(1746837895.463:816): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.493693 kernel: audit: type=1300 audit(1746837895.463:816): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc8300 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.463000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc8300 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.509818 kernel: audit: type=1327 audit(1746837895.463:816): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.509971 kernel: audit: type=1400 audit(1746837895.463:817): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.463000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.463000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc8840 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.526016 kernel: audit: type=1300 audit(1746837895.463:817): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cc8840 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.526181 kernel: audit: type=1327 audit(1746837895.463:817): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.463000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.540298 kernel: audit: type=1400 audit(1746837895.463:818): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.463000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba5340 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:44:55.463000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.748378 kubelet[2527]: I0510 00:44:55.748262 2527 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:44:55.750343 env[1555]: time="2025-05-10T00:44:55.750216899Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:44:55.751138 kubelet[2527]: I0510 00:44:55.751116 2527 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:44:56.236462 kubelet[2527]: I0510 00:44:56.236421 2527 topology_manager.go:215] "Topology Admit Handler" podUID="81ec073d-03cc-4d42-8b59-d9f5b89cb9bf" podNamespace="kube-system" podName="kube-proxy-plcn8" May 10 00:44:56.241550 systemd[1]: Created slice kubepods-besteffort-pod81ec073d_03cc_4d42_8b59_d9f5b89cb9bf.slice. May 10 00:44:56.355699 kubelet[2527]: I0510 00:44:56.355650 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/81ec073d-03cc-4d42-8b59-d9f5b89cb9bf-kube-proxy\") pod \"kube-proxy-plcn8\" (UID: \"81ec073d-03cc-4d42-8b59-d9f5b89cb9bf\") " pod="kube-system/kube-proxy-plcn8" May 10 00:44:56.355699 kubelet[2527]: I0510 00:44:56.355692 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/81ec073d-03cc-4d42-8b59-d9f5b89cb9bf-xtables-lock\") pod \"kube-proxy-plcn8\" (UID: \"81ec073d-03cc-4d42-8b59-d9f5b89cb9bf\") " pod="kube-system/kube-proxy-plcn8" May 10 00:44:56.356014 kubelet[2527]: I0510 00:44:56.355726 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7cwh\" (UniqueName: \"kubernetes.io/projected/81ec073d-03cc-4d42-8b59-d9f5b89cb9bf-kube-api-access-z7cwh\") pod \"kube-proxy-plcn8\" (UID: \"81ec073d-03cc-4d42-8b59-d9f5b89cb9bf\") " pod="kube-system/kube-proxy-plcn8" May 10 00:44:56.356014 kubelet[2527]: I0510 00:44:56.355748 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/81ec073d-03cc-4d42-8b59-d9f5b89cb9bf-lib-modules\") pod \"kube-proxy-plcn8\" (UID: \"81ec073d-03cc-4d42-8b59-d9f5b89cb9bf\") " pod="kube-system/kube-proxy-plcn8" May 10 00:44:56.465568 kubelet[2527]: E0510 00:44:56.465514 2527 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 10 00:44:56.465568 kubelet[2527]: E0510 00:44:56.465575 2527 projected.go:200] Error preparing data for projected volume kube-api-access-z7cwh for pod kube-system/kube-proxy-plcn8: configmap "kube-root-ca.crt" not found May 10 00:44:56.465901 kubelet[2527]: E0510 00:44:56.465884 2527 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/81ec073d-03cc-4d42-8b59-d9f5b89cb9bf-kube-api-access-z7cwh podName:81ec073d-03cc-4d42-8b59-d9f5b89cb9bf nodeName:}" failed. No retries permitted until 2025-05-10 00:44:56.965665882 +0000 UTC m=+13.314386053 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-z7cwh" (UniqueName: "kubernetes.io/projected/81ec073d-03cc-4d42-8b59-d9f5b89cb9bf-kube-api-access-z7cwh") pod "kube-proxy-plcn8" (UID: "81ec073d-03cc-4d42-8b59-d9f5b89cb9bf") : configmap "kube-root-ca.crt" not found May 10 00:44:56.684965 amazon-ssm-agent[1527]: 2025-05-10 00:44:56 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 10 00:44:56.874976 kubelet[2527]: I0510 00:44:56.874934 2527 topology_manager.go:215] "Topology Admit Handler" podUID="0be70738-49c7-498e-8ec2-172f9a51dc85" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-bm4bq" May 10 00:44:56.880033 systemd[1]: Created slice kubepods-besteffort-pod0be70738_49c7_498e_8ec2_172f9a51dc85.slice. May 10 00:44:56.883009 kubelet[2527]: W0510 00:44:56.882985 2527 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-18-109" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-109' and this object May 10 00:44:56.883206 kubelet[2527]: E0510 00:44:56.883192 2527 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-18-109" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-109' and this object May 10 00:44:56.883611 kubelet[2527]: W0510 00:44:56.883587 2527 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-18-109" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-109' and this object May 10 00:44:56.883611 kubelet[2527]: E0510 00:44:56.883614 2527 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-18-109" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-109' and this object May 10 00:44:57.060541 kubelet[2527]: I0510 00:44:57.060427 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0be70738-49c7-498e-8ec2-172f9a51dc85-var-lib-calico\") pod \"tigera-operator-797db67f8-bm4bq\" (UID: \"0be70738-49c7-498e-8ec2-172f9a51dc85\") " pod="tigera-operator/tigera-operator-797db67f8-bm4bq" May 10 00:44:57.060541 kubelet[2527]: I0510 00:44:57.060468 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dfftw\" (UniqueName: \"kubernetes.io/projected/0be70738-49c7-498e-8ec2-172f9a51dc85-kube-api-access-dfftw\") pod \"tigera-operator-797db67f8-bm4bq\" (UID: \"0be70738-49c7-498e-8ec2-172f9a51dc85\") " pod="tigera-operator/tigera-operator-797db67f8-bm4bq" May 10 00:44:57.149340 env[1555]: time="2025-05-10T00:44:57.149289484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-plcn8,Uid:81ec073d-03cc-4d42-8b59-d9f5b89cb9bf,Namespace:kube-system,Attempt:0,}" May 10 00:44:57.181372 env[1555]: time="2025-05-10T00:44:57.181277789Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:57.181372 env[1555]: time="2025-05-10T00:44:57.181327246Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:57.181372 env[1555]: time="2025-05-10T00:44:57.181343642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:57.181845 env[1555]: time="2025-05-10T00:44:57.181797391Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a719d8a6507ce30487717d3f8da058198fc883f8e346e6a395a5fb6f11ab0b08 pid=2703 runtime=io.containerd.runc.v2 May 10 00:44:57.201784 systemd[1]: Started cri-containerd-a719d8a6507ce30487717d3f8da058198fc883f8e346e6a395a5fb6f11ab0b08.scope. May 10 00:44:57.211764 systemd[1]: run-containerd-runc-k8s.io-a719d8a6507ce30487717d3f8da058198fc883f8e346e6a395a5fb6f11ab0b08-runc.R8xAf3.mount: Deactivated successfully. May 10 00:44:57.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.227000 audit: BPF prog-id=103 op=LOAD May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2703 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313964386136353037636533303438373731376433663864613035 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2703 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313964386136353037636533303438373731376433663864613035 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit: BPF prog-id=104 op=LOAD May 10 00:44:57.228000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001df030 items=0 ppid=2703 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313964386136353037636533303438373731376433663864613035 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit: BPF prog-id=105 op=LOAD May 10 00:44:57.228000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001df078 items=0 ppid=2703 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313964386136353037636533303438373731376433663864613035 May 10 00:44:57.228000 audit: BPF prog-id=105 op=UNLOAD May 10 00:44:57.228000 audit: BPF prog-id=104 op=UNLOAD May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { perfmon } for pid=2714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit[2714]: AVC avc: denied { bpf } for pid=2714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.228000 audit: BPF prog-id=106 op=LOAD May 10 00:44:57.228000 audit[2714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001df488 items=0 ppid=2703 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137313964386136353037636533303438373731376433663864613035 May 10 00:44:57.244440 env[1555]: time="2025-05-10T00:44:57.243612957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-plcn8,Uid:81ec073d-03cc-4d42-8b59-d9f5b89cb9bf,Namespace:kube-system,Attempt:0,} returns sandbox id \"a719d8a6507ce30487717d3f8da058198fc883f8e346e6a395a5fb6f11ab0b08\"" May 10 00:44:57.248781 env[1555]: time="2025-05-10T00:44:57.248314098Z" level=info msg="CreateContainer within sandbox \"a719d8a6507ce30487717d3f8da058198fc883f8e346e6a395a5fb6f11ab0b08\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:44:57.275461 env[1555]: time="2025-05-10T00:44:57.275405408Z" level=info msg="CreateContainer within sandbox \"a719d8a6507ce30487717d3f8da058198fc883f8e346e6a395a5fb6f11ab0b08\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bb7e9a6ac1e1695276af50edc510598ea17fdcaa0aee5e88e561f40939fe876f\"" May 10 00:44:57.277362 env[1555]: time="2025-05-10T00:44:57.276332918Z" level=info msg="StartContainer for \"bb7e9a6ac1e1695276af50edc510598ea17fdcaa0aee5e88e561f40939fe876f\"" May 10 00:44:57.295124 systemd[1]: Started cri-containerd-bb7e9a6ac1e1695276af50edc510598ea17fdcaa0aee5e88e561f40939fe876f.scope. May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe2bafede58 items=0 ppid=2703 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376539613661633165313639353237366166353065646335313035 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit: BPF prog-id=107 op=LOAD May 10 00:44:57.315000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000366158 items=0 ppid=2703 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376539613661633165313639353237366166353065646335313035 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit: BPF prog-id=108 op=LOAD May 10 00:44:57.315000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003661a8 items=0 ppid=2703 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376539613661633165313639353237366166353065646335313035 May 10 00:44:57.315000 audit: BPF prog-id=108 op=UNLOAD May 10 00:44:57.315000 audit: BPF prog-id=107 op=UNLOAD May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:57.315000 audit: BPF prog-id=109 op=LOAD May 10 00:44:57.315000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000366238 items=0 ppid=2703 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376539613661633165313639353237366166353065646335313035 May 10 00:44:57.337270 env[1555]: time="2025-05-10T00:44:57.337220354Z" level=info msg="StartContainer for \"bb7e9a6ac1e1695276af50edc510598ea17fdcaa0aee5e88e561f40939fe876f\" returns successfully" May 10 00:44:57.907000 audit[2801]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:57.907000 audit[2801]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6bf4e540 a2=0 a3=7fff6bf4e52c items=0 ppid=2758 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:44:57.910000 audit[2800]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:57.910000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd4758870 a2=0 a3=7fffd475885c items=0 ppid=2758 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:44:57.915000 audit[2802]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:57.915000 audit[2802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6130d820 a2=0 a3=7fff6130d80c items=0 ppid=2758 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.915000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:44:57.919000 audit[2803]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:57.919000 audit[2803]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7daa7670 a2=0 a3=7ffc7daa765c items=0 ppid=2758 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:44:57.926000 audit[2804]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:57.926000 audit[2804]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd224bbb80 a2=0 a3=7ffd224bbb6c items=0 ppid=2758 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:44:57.928000 audit[2805]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:57.928000 audit[2805]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc4c19ba0 a2=0 a3=7fffc4c19b8c items=0 ppid=2758 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:57.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:44:58.010000 audit[2807]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.010000 audit[2807]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd37201b40 a2=0 a3=7ffd37201b2c items=0 ppid=2758 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:44:58.016000 audit[2809]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.016000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe304d92d0 a2=0 a3=7ffe304d92bc items=0 ppid=2758 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:44:58.027000 audit[2812]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.027000 audit[2812]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff996d1e40 a2=0 a3=7fff996d1e2c items=0 ppid=2758 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:44:58.029000 audit[2813]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.029000 audit[2813]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb80cd530 a2=0 a3=7ffeb80cd51c items=0 ppid=2758 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:44:58.032000 audit[2815]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2815 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.032000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd135ae090 a2=0 a3=7ffd135ae07c items=0 ppid=2758 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:44:58.033000 audit[2816]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.033000 audit[2816]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8f8cc8f0 a2=0 a3=7ffc8f8cc8dc items=0 ppid=2758 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:44:58.037000 audit[2818]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2818 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.037000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5109f5a0 a2=0 a3=7fff5109f58c items=0 ppid=2758 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:44:58.041000 audit[2821]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.041000 audit[2821]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff8f0887a0 a2=0 a3=7fff8f08878c items=0 ppid=2758 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:44:58.042000 audit[2822]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2822 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.042000 audit[2822]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd805e0ab0 a2=0 a3=7ffd805e0a9c items=0 ppid=2758 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:44:58.045000 audit[2824]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.045000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6a5c62d0 a2=0 a3=7ffc6a5c62bc items=0 ppid=2758 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:44:58.047000 audit[2825]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.047000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2aed3c30 a2=0 a3=7ffe2aed3c1c items=0 ppid=2758 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:44:58.049000 audit[2827]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.049000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdca798790 a2=0 a3=7ffdca79877c items=0 ppid=2758 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:58.054000 audit[2830]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.054000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee8016830 a2=0 a3=7ffee801681c items=0 ppid=2758 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:58.058000 audit[2833]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2833 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.058000 audit[2833]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdde71a10 a2=0 a3=7fffdde719fc items=0 ppid=2758 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:44:58.059000 audit[2834]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.059000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc02127e40 a2=0 a3=7ffc02127e2c items=0 ppid=2758 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:44:58.064000 audit[2836]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2836 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.064000 audit[2836]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcfc735270 a2=0 a3=7ffcfc73525c items=0 ppid=2758 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:58.070000 audit[2839]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.070000 audit[2839]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3ae22280 a2=0 a3=7ffe3ae2226c items=0 ppid=2758 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:58.072000 audit[2840]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.072000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec456d6b0 a2=0 a3=7ffec456d69c items=0 ppid=2758 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:44:58.076000 audit[2842]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:58.076000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffdc0cae8e0 a2=0 a3=7ffdc0cae8cc items=0 ppid=2758 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:44:58.104000 audit[2848]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.104000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffeae24370 a2=0 a3=7fffeae2435c items=0 ppid=2758 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.121000 audit[2848]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:44:58.121000 audit[2848]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffeae24370 a2=0 a3=7fffeae2435c items=0 ppid=2758 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.124000 audit[2853]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.124000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf07bb6f0 a2=0 a3=7ffcf07bb6dc items=0 ppid=2758 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:44:58.127000 audit[2855]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.127000 audit[2855]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd7afc1810 a2=0 a3=7ffd7afc17fc items=0 ppid=2758 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:44:58.132000 audit[2858]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.132000 audit[2858]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca7862740 a2=0 a3=7ffca786272c items=0 ppid=2758 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:44:58.133000 audit[2859]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.133000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff268374b0 a2=0 a3=7fff2683749c items=0 ppid=2758 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:44:58.136000 audit[2861]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.136000 audit[2861]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb3f881d0 a2=0 a3=7ffcb3f881bc items=0 ppid=2758 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:44:58.137000 audit[2862]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.137000 audit[2862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8b53b1c0 a2=0 a3=7ffe8b53b1ac items=0 ppid=2758 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:44:58.140000 audit[2864]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.140000 audit[2864]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd56522260 a2=0 a3=7ffd5652224c items=0 ppid=2758 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:44:58.144000 audit[2867]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.144000 audit[2867]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc79f8a170 a2=0 a3=7ffc79f8a15c items=0 ppid=2758 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.144000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:44:58.146000 audit[2868]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.146000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff547a8650 a2=0 a3=7fff547a863c items=0 ppid=2758 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:44:58.148000 audit[2870]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.148000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff54d65fb0 a2=0 a3=7fff54d65f9c items=0 ppid=2758 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:44:58.150000 audit[2871]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2871 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.150000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4dd3ab20 a2=0 a3=7ffc4dd3ab0c items=0 ppid=2758 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.150000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:44:58.153000 audit[2873]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2873 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.153000 audit[2873]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6e75bd70 a2=0 a3=7fff6e75bd5c items=0 ppid=2758 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:44:58.157000 audit[2876]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.157000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe00381850 a2=0 a3=7ffe0038183c items=0 ppid=2758 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:44:58.161000 audit[2879]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.161000 audit[2879]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd399a7e60 a2=0 a3=7ffd399a7e4c items=0 ppid=2758 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:44:58.163000 audit[2880]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.163000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffc2b88c0 a2=0 a3=7ffffc2b88ac items=0 ppid=2758 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:44:58.167698 kubelet[2527]: E0510 00:44:58.167217 2527 projected.go:294] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 10 00:44:58.167698 kubelet[2527]: E0510 00:44:58.167257 2527 projected.go:200] Error preparing data for projected volume kube-api-access-dfftw for pod tigera-operator/tigera-operator-797db67f8-bm4bq: failed to sync configmap cache: timed out waiting for the condition May 10 00:44:58.167698 kubelet[2527]: E0510 00:44:58.167327 2527 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0be70738-49c7-498e-8ec2-172f9a51dc85-kube-api-access-dfftw podName:0be70738-49c7-498e-8ec2-172f9a51dc85 nodeName:}" failed. No retries permitted until 2025-05-10 00:44:58.667303768 +0000 UTC m=+15.016023940 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-dfftw" (UniqueName: "kubernetes.io/projected/0be70738-49c7-498e-8ec2-172f9a51dc85-kube-api-access-dfftw") pod "tigera-operator-797db67f8-bm4bq" (UID: "0be70738-49c7-498e-8ec2-172f9a51dc85") : failed to sync configmap cache: timed out waiting for the condition May 10 00:44:58.168000 audit[2882]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.168000 audit[2882]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc60535e50 a2=0 a3=7ffc60535e3c items=0 ppid=2758 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:58.172000 audit[2885]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.172000 audit[2885]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd7fa7080 a2=0 a3=7ffcd7fa706c items=0 ppid=2758 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:44:58.173000 audit[2886]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.173000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe31fc3d30 a2=0 a3=7ffe31fc3d1c items=0 ppid=2758 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:44:58.176000 audit[2888]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.176000 audit[2888]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffff2239fb0 a2=0 a3=7ffff2239f9c items=0 ppid=2758 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:44:58.178000 audit[2889]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.178000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccd0f83e0 a2=0 a3=7ffccd0f83cc items=0 ppid=2758 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:44:58.181000 audit[2891]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.181000 audit[2891]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcff4725d0 a2=0 a3=7ffcff4725bc items=0 ppid=2758 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:58.185000 audit[2894]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:58.185000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb808e1f0 a2=0 a3=7ffdb808e1dc items=0 ppid=2758 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:58.188000 audit[2896]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:44:58.188000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffdd09b4800 a2=0 a3=7ffdd09b47ec items=0 ppid=2758 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.188000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.189000 audit[2896]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:44:58.189000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdd09b4800 a2=0 a3=7ffdd09b47ec items=0 ppid=2758 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.189000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:44:58.682996 env[1555]: time="2025-05-10T00:44:58.682938057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-bm4bq,Uid:0be70738-49c7-498e-8ec2-172f9a51dc85,Namespace:tigera-operator,Attempt:0,}" May 10 00:44:58.710659 env[1555]: time="2025-05-10T00:44:58.710567277Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:58.710813 env[1555]: time="2025-05-10T00:44:58.710675197Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:58.710813 env[1555]: time="2025-05-10T00:44:58.710708224Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:58.711036 env[1555]: time="2025-05-10T00:44:58.710996618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f pid=2904 runtime=io.containerd.runc.v2 May 10 00:44:58.736587 systemd[1]: Started cri-containerd-b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f.scope. May 10 00:44:58.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.755000 audit: BPF prog-id=110 op=LOAD May 10 00:44:58.756000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.756000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2904 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323364313538636461373233626638663239313736333038343839 May 10 00:44:58.756000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.756000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2904 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323364313538636461373233626638663239313736333038343839 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.757000 audit: BPF prog-id=111 op=LOAD May 10 00:44:58.757000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003cc4a0 items=0 ppid=2904 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323364313538636461373233626638663239313736333038343839 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit: BPF prog-id=112 op=LOAD May 10 00:44:58.758000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003cc4e8 items=0 ppid=2904 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323364313538636461373233626638663239313736333038343839 May 10 00:44:58.758000 audit: BPF prog-id=112 op=UNLOAD May 10 00:44:58.758000 audit: BPF prog-id=111 op=UNLOAD May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { perfmon } for pid=2914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit[2914]: AVC avc: denied { bpf } for pid=2914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.758000 audit: BPF prog-id=113 op=LOAD May 10 00:44:58.758000 audit[2914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003cc8f8 items=0 ppid=2904 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237323364313538636461373233626638663239313736333038343839 May 10 00:44:58.794204 env[1555]: time="2025-05-10T00:44:58.794157638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-bm4bq,Uid:0be70738-49c7-498e-8ec2-172f9a51dc85,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f\"" May 10 00:44:58.801925 env[1555]: time="2025-05-10T00:44:58.801894590Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:44:59.065291 systemd[1]: run-containerd-runc-k8s.io-b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f-runc.YxkHYO.mount: Deactivated successfully. May 10 00:45:00.441576 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount720333442.mount: Deactivated successfully. May 10 00:45:01.305438 env[1555]: time="2025-05-10T00:45:01.305363952Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.308952 env[1555]: time="2025-05-10T00:45:01.308909769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.311122 env[1555]: time="2025-05-10T00:45:01.311048162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.317495 env[1555]: time="2025-05-10T00:45:01.317366250Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:01.319132 env[1555]: time="2025-05-10T00:45:01.319071655Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:45:01.331101 env[1555]: time="2025-05-10T00:45:01.331050807Z" level=info msg="CreateContainer within sandbox \"b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:45:01.362844 env[1555]: time="2025-05-10T00:45:01.362671057Z" level=info msg="CreateContainer within sandbox \"b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2\"" May 10 00:45:01.365187 env[1555]: time="2025-05-10T00:45:01.363382232Z" level=info msg="StartContainer for \"5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2\"" May 10 00:45:01.396446 systemd[1]: run-containerd-runc-k8s.io-5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2-runc.d5WGHQ.mount: Deactivated successfully. May 10 00:45:01.402468 systemd[1]: Started cri-containerd-5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2.scope. May 10 00:45:01.425710 kernel: kauditd_printk_skb: 312 callbacks suppressed May 10 00:45:01.425852 kernel: audit: type=1400 audit(1746837901.422:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.440598 kernel: audit: type=1400 audit(1746837901.422:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.451096 kernel: audit: type=1400 audit(1746837901.422:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.467851 kernel: audit: type=1400 audit(1746837901.422:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.467988 kernel: audit: type=1400 audit(1746837901.422:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.485445 kernel: audit: type=1400 audit(1746837901.422:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.485593 kernel: audit: type=1400 audit(1746837901.422:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.494410 kernel: audit: type=1400 audit(1746837901.422:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.494540 kernel: audit: type=1400 audit(1746837901.422:920): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.494850 env[1555]: time="2025-05-10T00:45:01.494803425Z" level=info msg="StartContainer for \"5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2\" returns successfully" May 10 00:45:01.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.513180 kernel: audit: type=1400 audit(1746837901.422:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.422000 audit: BPF prog-id=114 op=LOAD May 10 00:45:01.425000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2904 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303964623330343832623536383065613839366635333735323633 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2904 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303964623330343832623536383065613839366635333735323633 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.425000 audit: BPF prog-id=115 op=LOAD May 10 00:45:01.425000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000253a0 items=0 ppid=2904 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303964623330343832623536383065613839366635333735323633 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit: BPF prog-id=116 op=LOAD May 10 00:45:01.439000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000253e8 items=0 ppid=2904 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303964623330343832623536383065613839366635333735323633 May 10 00:45:01.439000 audit: BPF prog-id=116 op=UNLOAD May 10 00:45:01.439000 audit: BPF prog-id=115 op=UNLOAD May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:01.439000 audit: BPF prog-id=117 op=LOAD May 10 00:45:01.439000 audit[2948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000257f8 items=0 ppid=2904 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:01.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303964623330343832623536383065613839366635333735323633 May 10 00:45:01.932220 kubelet[2527]: I0510 00:45:01.931975 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-plcn8" podStartSLOduration=5.931935288 podStartE2EDuration="5.931935288s" podCreationTimestamp="2025-05-10 00:44:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:57.908507719 +0000 UTC m=+14.257227953" watchObservedRunningTime="2025-05-10 00:45:01.931935288 +0000 UTC m=+18.280655467" May 10 00:45:03.824685 kubelet[2527]: I0510 00:45:03.824625 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-bm4bq" podStartSLOduration=5.292587145 podStartE2EDuration="7.824602787s" podCreationTimestamp="2025-05-10 00:44:56 +0000 UTC" firstStartedPulling="2025-05-10 00:44:58.79605953 +0000 UTC m=+15.144779690" lastFinishedPulling="2025-05-10 00:45:01.328075162 +0000 UTC m=+17.676795332" observedRunningTime="2025-05-10 00:45:01.933627991 +0000 UTC m=+18.282348171" watchObservedRunningTime="2025-05-10 00:45:03.824602787 +0000 UTC m=+20.173322966" May 10 00:45:04.578000 audit[2981]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:04.578000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff0fb86730 a2=0 a3=7fff0fb8671c items=0 ppid=2758 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:04.584000 audit[2981]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:04.584000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff0fb86730 a2=0 a3=0 items=0 ppid=2758 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:04.595000 audit[2983]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:04.595000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffee12dfd50 a2=0 a3=7ffee12dfd3c items=0 ppid=2758 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:04.601000 audit[2983]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:04.601000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee12dfd50 a2=0 a3=0 items=0 ppid=2758 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:04.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:04.710057 kubelet[2527]: I0510 00:45:04.710002 2527 topology_manager.go:215] "Topology Admit Handler" podUID="739f22c9-7416-4155-8ff6-6e37b0f4434c" podNamespace="calico-system" podName="calico-typha-8686587c7f-r9tgv" May 10 00:45:04.715246 systemd[1]: Created slice kubepods-besteffort-pod739f22c9_7416_4155_8ff6_6e37b0f4434c.slice. May 10 00:45:04.785662 kubelet[2527]: I0510 00:45:04.785628 2527 topology_manager.go:215] "Topology Admit Handler" podUID="610017dd-5779-4f6a-8bda-ec7df7c6090f" podNamespace="calico-system" podName="calico-node-fkn5l" May 10 00:45:04.790447 systemd[1]: Created slice kubepods-besteffort-pod610017dd_5779_4f6a_8bda_ec7df7c6090f.slice. May 10 00:45:04.817056 kubelet[2527]: I0510 00:45:04.817030 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2h4jc\" (UniqueName: \"kubernetes.io/projected/610017dd-5779-4f6a-8bda-ec7df7c6090f-kube-api-access-2h4jc\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817254 kubelet[2527]: I0510 00:45:04.817240 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-policysync\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817368 kubelet[2527]: I0510 00:45:04.817358 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/610017dd-5779-4f6a-8bda-ec7df7c6090f-node-certs\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817477 kubelet[2527]: I0510 00:45:04.817465 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/739f22c9-7416-4155-8ff6-6e37b0f4434c-tigera-ca-bundle\") pod \"calico-typha-8686587c7f-r9tgv\" (UID: \"739f22c9-7416-4155-8ff6-6e37b0f4434c\") " pod="calico-system/calico-typha-8686587c7f-r9tgv" May 10 00:45:04.817566 kubelet[2527]: I0510 00:45:04.817557 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-lib-modules\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817653 kubelet[2527]: I0510 00:45:04.817644 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-xtables-lock\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817735 kubelet[2527]: I0510 00:45:04.817725 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/739f22c9-7416-4155-8ff6-6e37b0f4434c-typha-certs\") pod \"calico-typha-8686587c7f-r9tgv\" (UID: \"739f22c9-7416-4155-8ff6-6e37b0f4434c\") " pod="calico-system/calico-typha-8686587c7f-r9tgv" May 10 00:45:04.817820 kubelet[2527]: I0510 00:45:04.817811 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-log-dir\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817909 kubelet[2527]: I0510 00:45:04.817899 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/610017dd-5779-4f6a-8bda-ec7df7c6090f-tigera-ca-bundle\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.817994 kubelet[2527]: I0510 00:45:04.817985 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-run-calico\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.818091 kubelet[2527]: I0510 00:45:04.818067 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-lib-calico\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.818169 kubelet[2527]: I0510 00:45:04.818160 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-net-dir\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.818269 kubelet[2527]: I0510 00:45:04.818259 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjdfv\" (UniqueName: \"kubernetes.io/projected/739f22c9-7416-4155-8ff6-6e37b0f4434c-kube-api-access-wjdfv\") pod \"calico-typha-8686587c7f-r9tgv\" (UID: \"739f22c9-7416-4155-8ff6-6e37b0f4434c\") " pod="calico-system/calico-typha-8686587c7f-r9tgv" May 10 00:45:04.818359 kubelet[2527]: I0510 00:45:04.818350 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-bin-dir\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.818443 kubelet[2527]: I0510 00:45:04.818434 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-flexvol-driver-host\") pod \"calico-node-fkn5l\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " pod="calico-system/calico-node-fkn5l" May 10 00:45:04.938308 kubelet[2527]: I0510 00:45:04.938229 2527 topology_manager.go:215] "Topology Admit Handler" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" podNamespace="calico-system" podName="csi-node-driver-2gfcq" May 10 00:45:04.943476 kubelet[2527]: E0510 00:45:04.943438 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:04.944475 kubelet[2527]: E0510 00:45:04.944454 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:04.944616 kubelet[2527]: W0510 00:45:04.944601 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:04.944708 kubelet[2527]: E0510 00:45:04.944695 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:04.948969 kubelet[2527]: E0510 00:45:04.948948 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:04.949160 kubelet[2527]: W0510 00:45:04.949144 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:04.949266 kubelet[2527]: E0510 00:45:04.949251 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:04.976918 kubelet[2527]: E0510 00:45:04.976894 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:04.977185 kubelet[2527]: W0510 00:45:04.977167 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:04.977308 kubelet[2527]: E0510 00:45:04.977294 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:04.977669 kubelet[2527]: E0510 00:45:04.977654 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:04.977780 kubelet[2527]: W0510 00:45:04.977768 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:04.977870 kubelet[2527]: E0510 00:45:04.977856 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.022305 kubelet[2527]: E0510 00:45:05.022280 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.022595 kubelet[2527]: W0510 00:45:05.022578 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.022672 kubelet[2527]: E0510 00:45:05.022662 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.023186 kubelet[2527]: E0510 00:45:05.023170 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.023311 kubelet[2527]: W0510 00:45:05.023297 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.023407 kubelet[2527]: E0510 00:45:05.023396 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.023730 kubelet[2527]: E0510 00:45:05.023716 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.023825 kubelet[2527]: W0510 00:45:05.023812 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.023904 kubelet[2527]: E0510 00:45:05.023893 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.024202 kubelet[2527]: E0510 00:45:05.024189 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.024308 kubelet[2527]: W0510 00:45:05.024296 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.024393 kubelet[2527]: E0510 00:45:05.024382 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.024689 kubelet[2527]: E0510 00:45:05.024678 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.024786 kubelet[2527]: W0510 00:45:05.024775 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.024860 kubelet[2527]: E0510 00:45:05.024848 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.025142 kubelet[2527]: E0510 00:45:05.025129 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.025241 kubelet[2527]: W0510 00:45:05.025229 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.025326 kubelet[2527]: E0510 00:45:05.025314 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.025583 kubelet[2527]: E0510 00:45:05.025572 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.025674 kubelet[2527]: W0510 00:45:05.025662 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.025747 kubelet[2527]: E0510 00:45:05.025736 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.026024 kubelet[2527]: E0510 00:45:05.026012 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.026248 kubelet[2527]: W0510 00:45:05.026233 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.026408 kubelet[2527]: E0510 00:45:05.026394 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.026950 kubelet[2527]: E0510 00:45:05.026818 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.026950 kubelet[2527]: W0510 00:45:05.026832 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.026950 kubelet[2527]: E0510 00:45:05.026846 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.027157 kubelet[2527]: E0510 00:45:05.027059 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.027157 kubelet[2527]: W0510 00:45:05.027070 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.027157 kubelet[2527]: E0510 00:45:05.027101 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.028400 env[1555]: time="2025-05-10T00:45:05.027867922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8686587c7f-r9tgv,Uid:739f22c9-7416-4155-8ff6-6e37b0f4434c,Namespace:calico-system,Attempt:0,}" May 10 00:45:05.028981 kubelet[2527]: E0510 00:45:05.028968 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.029181 kubelet[2527]: W0510 00:45:05.029165 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.029280 kubelet[2527]: E0510 00:45:05.029268 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.031395 kubelet[2527]: E0510 00:45:05.031380 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.031531 kubelet[2527]: W0510 00:45:05.031515 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.031625 kubelet[2527]: E0510 00:45:05.031612 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.032464 kubelet[2527]: E0510 00:45:05.032450 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.032571 kubelet[2527]: W0510 00:45:05.032557 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.032654 kubelet[2527]: E0510 00:45:05.032642 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.032925 kubelet[2527]: E0510 00:45:05.032913 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.035156 kubelet[2527]: W0510 00:45:05.033067 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.035380 kubelet[2527]: E0510 00:45:05.035361 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.035783 kubelet[2527]: E0510 00:45:05.035764 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.035884 kubelet[2527]: W0510 00:45:05.035782 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.035884 kubelet[2527]: E0510 00:45:05.035798 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.036352 kubelet[2527]: E0510 00:45:05.036030 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.036352 kubelet[2527]: W0510 00:45:05.036042 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.036352 kubelet[2527]: E0510 00:45:05.036054 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.036352 kubelet[2527]: E0510 00:45:05.036330 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.036352 kubelet[2527]: W0510 00:45:05.036339 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.036352 kubelet[2527]: E0510 00:45:05.036352 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.036711 kubelet[2527]: E0510 00:45:05.036539 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.036711 kubelet[2527]: W0510 00:45:05.036548 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.036711 kubelet[2527]: E0510 00:45:05.036559 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.036893 kubelet[2527]: E0510 00:45:05.036740 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.036893 kubelet[2527]: W0510 00:45:05.036749 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.036893 kubelet[2527]: E0510 00:45:05.036761 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.037036 kubelet[2527]: E0510 00:45:05.036945 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.037036 kubelet[2527]: W0510 00:45:05.036957 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.037036 kubelet[2527]: E0510 00:45:05.036969 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.037435 kubelet[2527]: E0510 00:45:05.037289 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.037435 kubelet[2527]: W0510 00:45:05.037301 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.037435 kubelet[2527]: E0510 00:45:05.037314 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.037435 kubelet[2527]: I0510 00:45:05.037343 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/bb27db3f-e255-4e8f-8959-a138791be4d5-socket-dir\") pod \"csi-node-driver-2gfcq\" (UID: \"bb27db3f-e255-4e8f-8959-a138791be4d5\") " pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:05.037645 kubelet[2527]: E0510 00:45:05.037573 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.037645 kubelet[2527]: W0510 00:45:05.037585 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.037645 kubelet[2527]: E0510 00:45:05.037601 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.037645 kubelet[2527]: I0510 00:45:05.037625 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/bb27db3f-e255-4e8f-8959-a138791be4d5-registration-dir\") pod \"csi-node-driver-2gfcq\" (UID: \"bb27db3f-e255-4e8f-8959-a138791be4d5\") " pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:05.037875 kubelet[2527]: E0510 00:45:05.037858 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.037932 kubelet[2527]: W0510 00:45:05.037875 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.037932 kubelet[2527]: E0510 00:45:05.037891 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.037932 kubelet[2527]: I0510 00:45:05.037917 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5hbr5\" (UniqueName: \"kubernetes.io/projected/bb27db3f-e255-4e8f-8959-a138791be4d5-kube-api-access-5hbr5\") pod \"csi-node-driver-2gfcq\" (UID: \"bb27db3f-e255-4e8f-8959-a138791be4d5\") " pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:05.038179 kubelet[2527]: E0510 00:45:05.038162 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.039441 kubelet[2527]: W0510 00:45:05.038179 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.039441 kubelet[2527]: E0510 00:45:05.038196 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.039441 kubelet[2527]: I0510 00:45:05.038217 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/bb27db3f-e255-4e8f-8959-a138791be4d5-kubelet-dir\") pod \"csi-node-driver-2gfcq\" (UID: \"bb27db3f-e255-4e8f-8959-a138791be4d5\") " pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:05.040586 kubelet[2527]: E0510 00:45:05.040562 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.040687 kubelet[2527]: W0510 00:45:05.040585 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.040687 kubelet[2527]: E0510 00:45:05.040607 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.040687 kubelet[2527]: I0510 00:45:05.040636 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/bb27db3f-e255-4e8f-8959-a138791be4d5-varrun\") pod \"csi-node-driver-2gfcq\" (UID: \"bb27db3f-e255-4e8f-8959-a138791be4d5\") " pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:05.041443 kubelet[2527]: E0510 00:45:05.040983 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.041443 kubelet[2527]: W0510 00:45:05.041040 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.041443 kubelet[2527]: E0510 00:45:05.041103 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.041443 kubelet[2527]: E0510 00:45:05.041305 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.041443 kubelet[2527]: W0510 00:45:05.041315 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.041443 kubelet[2527]: E0510 00:45:05.041416 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.041850 kubelet[2527]: E0510 00:45:05.041547 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.041850 kubelet[2527]: W0510 00:45:05.041557 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.041850 kubelet[2527]: E0510 00:45:05.041655 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.041850 kubelet[2527]: E0510 00:45:05.041793 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.041850 kubelet[2527]: W0510 00:45:05.041802 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.042213 kubelet[2527]: E0510 00:45:05.041897 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.042213 kubelet[2527]: E0510 00:45:05.042025 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.042213 kubelet[2527]: W0510 00:45:05.042037 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.042213 kubelet[2527]: E0510 00:45:05.042159 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.042397 kubelet[2527]: E0510 00:45:05.042283 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.042397 kubelet[2527]: W0510 00:45:05.042292 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.042397 kubelet[2527]: E0510 00:45:05.042303 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.042537 kubelet[2527]: E0510 00:45:05.042498 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.042537 kubelet[2527]: W0510 00:45:05.042507 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.042537 kubelet[2527]: E0510 00:45:05.042518 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.042731 kubelet[2527]: E0510 00:45:05.042704 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.042731 kubelet[2527]: W0510 00:45:05.042714 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.042731 kubelet[2527]: E0510 00:45:05.042725 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.042932 kubelet[2527]: E0510 00:45:05.042917 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.042932 kubelet[2527]: W0510 00:45:05.042932 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.043069 kubelet[2527]: E0510 00:45:05.042943 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.043182 kubelet[2527]: E0510 00:45:05.043168 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.043584 kubelet[2527]: W0510 00:45:05.043182 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.043584 kubelet[2527]: E0510 00:45:05.043194 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.065950 env[1555]: time="2025-05-10T00:45:05.062638550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:05.065950 env[1555]: time="2025-05-10T00:45:05.062724321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:05.065950 env[1555]: time="2025-05-10T00:45:05.062740881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:05.065950 env[1555]: time="2025-05-10T00:45:05.062907320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6 pid=3034 runtime=io.containerd.runc.v2 May 10 00:45:05.089160 systemd[1]: Started cri-containerd-ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6.scope. May 10 00:45:05.094309 env[1555]: time="2025-05-10T00:45:05.094253144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fkn5l,Uid:610017dd-5779-4f6a-8bda-ec7df7c6090f,Namespace:calico-system,Attempt:0,}" May 10 00:45:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.125000 audit: BPF prog-id=118 op=LOAD May 10 00:45:05.127000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.127000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3034 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626363643437326161626262386239393466613864316662343764 May 10 00:45:05.127000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.127000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3034 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626363643437326161626262386239393466613864316662343764 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.128000 audit: BPF prog-id=119 op=LOAD May 10 00:45:05.128000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002ddcd0 items=0 ppid=3034 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626363643437326161626262386239393466613864316662343764 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.129000 audit: BPF prog-id=120 op=LOAD May 10 00:45:05.129000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002ddd18 items=0 ppid=3034 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626363643437326161626262386239393466613864316662343764 May 10 00:45:05.129000 audit: BPF prog-id=120 op=UNLOAD May 10 00:45:05.130000 audit: BPF prog-id=119 op=UNLOAD May 10 00:45:05.130000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.130000 audit: BPF prog-id=121 op=LOAD May 10 00:45:05.130000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003e2128 items=0 ppid=3034 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666626363643437326161626262386239393466613864316662343764 May 10 00:45:05.141557 kubelet[2527]: E0510 00:45:05.141527 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.141557 kubelet[2527]: W0510 00:45:05.141554 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.141557 kubelet[2527]: E0510 00:45:05.141579 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.142067 kubelet[2527]: E0510 00:45:05.141880 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.142067 kubelet[2527]: W0510 00:45:05.141892 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.142067 kubelet[2527]: E0510 00:45:05.141911 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.142317 kubelet[2527]: E0510 00:45:05.142198 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.142317 kubelet[2527]: W0510 00:45:05.142208 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.142317 kubelet[2527]: E0510 00:45:05.142225 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.142489 kubelet[2527]: E0510 00:45:05.142479 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.142540 kubelet[2527]: W0510 00:45:05.142489 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.142540 kubelet[2527]: E0510 00:45:05.142505 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.142768 kubelet[2527]: E0510 00:45:05.142756 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.142768 kubelet[2527]: W0510 00:45:05.142768 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.142900 kubelet[2527]: E0510 00:45:05.142784 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.143041 kubelet[2527]: E0510 00:45:05.143028 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.143128 kubelet[2527]: W0510 00:45:05.143041 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.145136 kubelet[2527]: E0510 00:45:05.145112 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.145384 kubelet[2527]: E0510 00:45:05.145337 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.145384 kubelet[2527]: W0510 00:45:05.145350 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.145574 kubelet[2527]: E0510 00:45:05.145438 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.145641 kubelet[2527]: E0510 00:45:05.145575 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.145641 kubelet[2527]: W0510 00:45:05.145584 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.145749 kubelet[2527]: E0510 00:45:05.145673 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.145813 kubelet[2527]: E0510 00:45:05.145800 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.145882 kubelet[2527]: W0510 00:45:05.145815 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.145943 kubelet[2527]: E0510 00:45:05.145895 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.146116 kubelet[2527]: E0510 00:45:05.146022 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.146116 kubelet[2527]: W0510 00:45:05.146032 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.146253 kubelet[2527]: E0510 00:45:05.146150 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.146303 kubelet[2527]: E0510 00:45:05.146287 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.146303 kubelet[2527]: W0510 00:45:05.146295 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.146427 kubelet[2527]: E0510 00:45:05.146311 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.146531 kubelet[2527]: E0510 00:45:05.146515 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.146619 kubelet[2527]: W0510 00:45:05.146531 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.146619 kubelet[2527]: E0510 00:45:05.146549 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.146836 kubelet[2527]: E0510 00:45:05.146819 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.146911 kubelet[2527]: W0510 00:45:05.146836 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.146963 kubelet[2527]: E0510 00:45:05.146919 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.147093 kubelet[2527]: E0510 00:45:05.147066 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.149135 kubelet[2527]: W0510 00:45:05.149109 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.149401 kubelet[2527]: E0510 00:45:05.149253 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.152171 kubelet[2527]: E0510 00:45:05.152148 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.152171 kubelet[2527]: W0510 00:45:05.152165 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.153862 kubelet[2527]: E0510 00:45:05.152284 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.153862 kubelet[2527]: E0510 00:45:05.152436 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.153862 kubelet[2527]: W0510 00:45:05.152445 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.153862 kubelet[2527]: E0510 00:45:05.152530 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.153862 kubelet[2527]: E0510 00:45:05.153559 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.153862 kubelet[2527]: W0510 00:45:05.153570 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.153862 kubelet[2527]: E0510 00:45:05.153665 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.153862 kubelet[2527]: E0510 00:45:05.153805 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.153862 kubelet[2527]: W0510 00:45:05.153813 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.154870 kubelet[2527]: E0510 00:45:05.153893 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.154870 kubelet[2527]: E0510 00:45:05.154039 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.154870 kubelet[2527]: W0510 00:45:05.154047 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.158151 kubelet[2527]: E0510 00:45:05.158112 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.158414 kubelet[2527]: E0510 00:45:05.158396 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.158784 kubelet[2527]: W0510 00:45:05.158415 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.158784 kubelet[2527]: E0510 00:45:05.158604 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.158784 kubelet[2527]: W0510 00:45:05.158613 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.158826 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.160809 kubelet[2527]: W0510 00:45:05.158836 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.158849 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.158883 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.159149 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.159225 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.160809 kubelet[2527]: W0510 00:45:05.159233 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.159247 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.160809 kubelet[2527]: E0510 00:45:05.159477 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.160809 kubelet[2527]: W0510 00:45:05.159487 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.161321 kubelet[2527]: E0510 00:45:05.159503 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.161321 kubelet[2527]: E0510 00:45:05.159703 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.161321 kubelet[2527]: W0510 00:45:05.159712 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.161321 kubelet[2527]: E0510 00:45:05.159722 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.177798 kubelet[2527]: E0510 00:45:05.177752 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:05.177798 kubelet[2527]: W0510 00:45:05.177775 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:05.177798 kubelet[2527]: E0510 00:45:05.177798 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:05.179188 env[1555]: time="2025-05-10T00:45:05.179048743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:05.179188 env[1555]: time="2025-05-10T00:45:05.179147167Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:05.179898 env[1555]: time="2025-05-10T00:45:05.179164082Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:05.183668 env[1555]: time="2025-05-10T00:45:05.183609358Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d pid=3093 runtime=io.containerd.runc.v2 May 10 00:45:05.205976 systemd[1]: Started cri-containerd-5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d.scope. May 10 00:45:05.231344 env[1555]: time="2025-05-10T00:45:05.231300180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-8686587c7f-r9tgv,Uid:739f22c9-7416-4155-8ff6-6e37b0f4434c,Namespace:calico-system,Attempt:0,} returns sandbox id \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\"" May 10 00:45:05.235524 env[1555]: time="2025-05-10T00:45:05.235484201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:45:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.248000 audit: BPF prog-id=122 op=LOAD May 10 00:45:05.250000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.250000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3093 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613737626632633639323133633939393030646463336262316238 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3093 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613737626632633639323133633939393030646463336262316238 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.251000 audit: BPF prog-id=123 op=LOAD May 10 00:45:05.251000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d4930 items=0 ppid=3093 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613737626632633639323133633939393030646463336262316238 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.252000 audit: BPF prog-id=124 op=LOAD May 10 00:45:05.252000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d4978 items=0 ppid=3093 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613737626632633639323133633939393030646463336262316238 May 10 00:45:05.253000 audit: BPF prog-id=124 op=UNLOAD May 10 00:45:05.253000 audit: BPF prog-id=123 op=UNLOAD May 10 00:45:05.253000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:05.253000 audit: BPF prog-id=125 op=LOAD May 10 00:45:05.253000 audit[3105]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d4d88 items=0 ppid=3093 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566613737626632633639323133633939393030646463336262316238 May 10 00:45:05.279817 env[1555]: time="2025-05-10T00:45:05.279755603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fkn5l,Uid:610017dd-5779-4f6a-8bda-ec7df7c6090f,Namespace:calico-system,Attempt:0,} returns sandbox id \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\"" May 10 00:45:05.614000 audit[3137]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:05.614000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd61baa8f0 a2=0 a3=7ffd61baa8dc items=0 ppid=2758 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:05.620000 audit[3137]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:05.620000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd61baa8f0 a2=0 a3=0 items=0 ppid=2758 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:05.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:06.788560 kubelet[2527]: E0510 00:45:06.787907 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:07.656006 env[1555]: time="2025-05-10T00:45:07.655963538Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:07.658567 env[1555]: time="2025-05-10T00:45:07.658524496Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:07.661395 env[1555]: time="2025-05-10T00:45:07.661352029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:07.663148 env[1555]: time="2025-05-10T00:45:07.663117507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:07.663604 env[1555]: time="2025-05-10T00:45:07.663550422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:45:07.665675 env[1555]: time="2025-05-10T00:45:07.665631435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:45:07.678993 env[1555]: time="2025-05-10T00:45:07.678955599Z" level=info msg="CreateContainer within sandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:45:07.693477 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3316674156.mount: Deactivated successfully. May 10 00:45:07.704709 env[1555]: time="2025-05-10T00:45:07.704648524Z" level=info msg="CreateContainer within sandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\"" May 10 00:45:07.707046 env[1555]: time="2025-05-10T00:45:07.705418895Z" level=info msg="StartContainer for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\"" May 10 00:45:07.740558 systemd[1]: Started cri-containerd-c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5.scope. May 10 00:45:07.775105 kernel: kauditd_printk_skb: 179 callbacks suppressed May 10 00:45:07.781196 kernel: audit: type=1400 audit(1746837907.764:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.781322 kernel: audit: type=1400 audit(1746837907.764:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.783348 kernel: audit: type=1400 audit(1746837907.764:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.796685 kernel: audit: type=1400 audit(1746837907.764:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.800996 kernel: audit: type=1400 audit(1746837907.764:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.812019 kernel: audit: type=1400 audit(1746837907.764:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.827850 kernel: audit: type=1400 audit(1746837907.764:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.827991 kernel: audit: type=1400 audit(1746837907.764:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.828040 kernel: audit: type=1400 audit(1746837907.764:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.764000 audit: BPF prog-id=126 op=LOAD May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3034 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339626233303866303661313132376335663861653036303336626334 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.844741 kernel: audit: type=1400 audit(1746837907.764:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3034 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339626233303866303661313132376335663861653036303336626334 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit: BPF prog-id=127 op=LOAD May 10 00:45:07.774000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000384920 items=0 ppid=3034 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339626233303866303661313132376335663861653036303336626334 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit: BPF prog-id=128 op=LOAD May 10 00:45:07.774000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000384968 items=0 ppid=3034 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339626233303866303661313132376335663861653036303336626334 May 10 00:45:07.774000 audit: BPF prog-id=128 op=UNLOAD May 10 00:45:07.774000 audit: BPF prog-id=127 op=UNLOAD May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { perfmon } for pid=3150 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit[3150]: AVC avc: denied { bpf } for pid=3150 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:07.774000 audit: BPF prog-id=129 op=LOAD May 10 00:45:07.774000 audit[3150]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000384d78 items=0 ppid=3034 pid=3150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:07.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339626233303866303661313132376335663861653036303336626334 May 10 00:45:07.879143 env[1555]: time="2025-05-10T00:45:07.879097364Z" level=info msg="StartContainer for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" returns successfully" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959036 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.959863 kubelet[2527]: W0510 00:45:07.959059 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959103 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959307 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.959863 kubelet[2527]: W0510 00:45:07.959314 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959323 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959480 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.959863 kubelet[2527]: W0510 00:45:07.959486 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959494 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.959863 kubelet[2527]: E0510 00:45:07.959755 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.960892 kubelet[2527]: W0510 00:45:07.959762 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.960892 kubelet[2527]: E0510 00:45:07.959771 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.961305 kubelet[2527]: E0510 00:45:07.961147 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.961305 kubelet[2527]: W0510 00:45:07.961162 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.961305 kubelet[2527]: E0510 00:45:07.961182 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.961669 kubelet[2527]: E0510 00:45:07.961557 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.961669 kubelet[2527]: W0510 00:45:07.961571 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.961669 kubelet[2527]: E0510 00:45:07.961585 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.961987 kubelet[2527]: E0510 00:45:07.961874 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.961987 kubelet[2527]: W0510 00:45:07.961883 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.961987 kubelet[2527]: E0510 00:45:07.961896 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.962334 kubelet[2527]: E0510 00:45:07.962217 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.962334 kubelet[2527]: W0510 00:45:07.962227 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.962334 kubelet[2527]: E0510 00:45:07.962238 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.962648 kubelet[2527]: E0510 00:45:07.962534 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.962648 kubelet[2527]: W0510 00:45:07.962547 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.962648 kubelet[2527]: E0510 00:45:07.962559 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.962962 kubelet[2527]: E0510 00:45:07.962852 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.962962 kubelet[2527]: W0510 00:45:07.962864 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.962962 kubelet[2527]: E0510 00:45:07.962874 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.963344 kubelet[2527]: E0510 00:45:07.963244 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.963344 kubelet[2527]: W0510 00:45:07.963254 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.963344 kubelet[2527]: E0510 00:45:07.963264 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.963671 kubelet[2527]: E0510 00:45:07.963561 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.963671 kubelet[2527]: W0510 00:45:07.963571 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.963671 kubelet[2527]: E0510 00:45:07.963581 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.963983 kubelet[2527]: E0510 00:45:07.963862 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.963983 kubelet[2527]: W0510 00:45:07.963874 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.963983 kubelet[2527]: E0510 00:45:07.963888 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.965396 kubelet[2527]: E0510 00:45:07.965383 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.965494 kubelet[2527]: W0510 00:45:07.965480 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.965604 kubelet[2527]: E0510 00:45:07.965579 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:07.966281 kubelet[2527]: E0510 00:45:07.966266 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:07.966541 kubelet[2527]: W0510 00:45:07.966524 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:07.966653 kubelet[2527]: E0510 00:45:07.966639 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.059315 kubelet[2527]: E0510 00:45:08.059283 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.059315 kubelet[2527]: W0510 00:45:08.059307 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.059315 kubelet[2527]: E0510 00:45:08.059329 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.059609 kubelet[2527]: E0510 00:45:08.059585 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.059609 kubelet[2527]: W0510 00:45:08.059600 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.059609 kubelet[2527]: E0510 00:45:08.059611 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.059940 kubelet[2527]: E0510 00:45:08.059920 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.059998 kubelet[2527]: W0510 00:45:08.059939 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.059998 kubelet[2527]: E0510 00:45:08.059959 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.060554 kubelet[2527]: E0510 00:45:08.060357 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.060554 kubelet[2527]: W0510 00:45:08.060380 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.060554 kubelet[2527]: E0510 00:45:08.060401 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.060677 kubelet[2527]: E0510 00:45:08.060602 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.060677 kubelet[2527]: W0510 00:45:08.060615 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.060677 kubelet[2527]: E0510 00:45:08.060630 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.060945 kubelet[2527]: E0510 00:45:08.060927 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.060992 kubelet[2527]: W0510 00:45:08.060954 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.061102 kubelet[2527]: E0510 00:45:08.061070 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.061316 kubelet[2527]: E0510 00:45:08.061296 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.061316 kubelet[2527]: W0510 00:45:08.061308 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.061444 kubelet[2527]: E0510 00:45:08.061390 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.061592 kubelet[2527]: E0510 00:45:08.061569 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.061592 kubelet[2527]: W0510 00:45:08.061588 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.061730 kubelet[2527]: E0510 00:45:08.061718 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.061792 kubelet[2527]: E0510 00:45:08.061771 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.061868 kubelet[2527]: W0510 00:45:08.061847 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.061868 kubelet[2527]: E0510 00:45:08.061870 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.062226 kubelet[2527]: E0510 00:45:08.062205 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.062226 kubelet[2527]: W0510 00:45:08.062222 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.062337 kubelet[2527]: E0510 00:45:08.062241 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.062543 kubelet[2527]: E0510 00:45:08.062524 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.062543 kubelet[2527]: W0510 00:45:08.062537 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.062655 kubelet[2527]: E0510 00:45:08.062560 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.062815 kubelet[2527]: E0510 00:45:08.062796 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.062815 kubelet[2527]: W0510 00:45:08.062810 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.062919 kubelet[2527]: E0510 00:45:08.062825 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.063298 kubelet[2527]: E0510 00:45:08.063282 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.063298 kubelet[2527]: W0510 00:45:08.063294 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.063407 kubelet[2527]: E0510 00:45:08.063395 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.063524 kubelet[2527]: E0510 00:45:08.063502 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.063524 kubelet[2527]: W0510 00:45:08.063515 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.063625 kubelet[2527]: E0510 00:45:08.063590 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.063738 kubelet[2527]: E0510 00:45:08.063718 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.063789 kubelet[2527]: W0510 00:45:08.063742 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.063789 kubelet[2527]: E0510 00:45:08.063758 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.063995 kubelet[2527]: E0510 00:45:08.063981 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.063995 kubelet[2527]: W0510 00:45:08.063992 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.064194 kubelet[2527]: E0510 00:45:08.064003 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.064383 kubelet[2527]: E0510 00:45:08.064365 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.064383 kubelet[2527]: W0510 00:45:08.064378 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.064482 kubelet[2527]: E0510 00:45:08.064389 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.064897 kubelet[2527]: E0510 00:45:08.064883 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.064897 kubelet[2527]: W0510 00:45:08.064895 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.064897 kubelet[2527]: E0510 00:45:08.064904 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.788533 kubelet[2527]: E0510 00:45:08.788182 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:08.935195 kubelet[2527]: I0510 00:45:08.935135 2527 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.975984 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.977943 kubelet[2527]: W0510 00:45:08.976021 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.976196 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.976437 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.977943 kubelet[2527]: W0510 00:45:08.976446 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.976456 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.976617 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.977943 kubelet[2527]: W0510 00:45:08.976624 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.976631 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.977943 kubelet[2527]: E0510 00:45:08.976786 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.978732 kubelet[2527]: W0510 00:45:08.976800 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.978732 kubelet[2527]: E0510 00:45:08.976808 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.978732 kubelet[2527]: E0510 00:45:08.976968 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.978732 kubelet[2527]: W0510 00:45:08.976976 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.978732 kubelet[2527]: E0510 00:45:08.976983 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.978732 kubelet[2527]: E0510 00:45:08.977133 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.978732 kubelet[2527]: W0510 00:45:08.977139 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.978732 kubelet[2527]: E0510 00:45:08.977147 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979034 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.980119 kubelet[2527]: W0510 00:45:08.979049 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979063 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979358 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.980119 kubelet[2527]: W0510 00:45:08.979366 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979375 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979622 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.980119 kubelet[2527]: W0510 00:45:08.979634 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979642 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.980119 kubelet[2527]: E0510 00:45:08.979840 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.980980 kubelet[2527]: W0510 00:45:08.979862 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.980980 kubelet[2527]: E0510 00:45:08.980463 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.981345 kubelet[2527]: E0510 00:45:08.981103 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.981345 kubelet[2527]: W0510 00:45:08.981113 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.981345 kubelet[2527]: E0510 00:45:08.981124 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.981345 kubelet[2527]: E0510 00:45:08.981276 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.981345 kubelet[2527]: W0510 00:45:08.981282 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.981345 kubelet[2527]: E0510 00:45:08.981289 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.981794 kubelet[2527]: E0510 00:45:08.981658 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.981794 kubelet[2527]: W0510 00:45:08.981667 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.981794 kubelet[2527]: E0510 00:45:08.981676 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.982001 kubelet[2527]: E0510 00:45:08.981931 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.982001 kubelet[2527]: W0510 00:45:08.981938 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.982001 kubelet[2527]: E0510 00:45:08.981946 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:08.983374 kubelet[2527]: E0510 00:45:08.983365 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:08.983501 kubelet[2527]: W0510 00:45:08.983442 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:08.983501 kubelet[2527]: E0510 00:45:08.983456 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.068367 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.069872 kubelet[2527]: W0510 00:45:09.068398 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.068419 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.068667 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.069872 kubelet[2527]: W0510 00:45:09.068675 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.068695 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.068893 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.069872 kubelet[2527]: W0510 00:45:09.068900 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.068911 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.069872 kubelet[2527]: E0510 00:45:09.069131 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070411 kubelet[2527]: W0510 00:45:09.069138 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070411 kubelet[2527]: E0510 00:45:09.069149 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070411 kubelet[2527]: E0510 00:45:09.069328 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070411 kubelet[2527]: W0510 00:45:09.069334 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070411 kubelet[2527]: E0510 00:45:09.069343 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070411 kubelet[2527]: E0510 00:45:09.069503 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070411 kubelet[2527]: W0510 00:45:09.069509 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070411 kubelet[2527]: E0510 00:45:09.069521 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070411 kubelet[2527]: E0510 00:45:09.069706 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070411 kubelet[2527]: W0510 00:45:09.069712 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.069776 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.070095 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070682 kubelet[2527]: W0510 00:45:09.070103 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.070175 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.070285 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070682 kubelet[2527]: W0510 00:45:09.070292 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.070358 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.070464 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070682 kubelet[2527]: W0510 00:45:09.070470 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070682 kubelet[2527]: E0510 00:45:09.070480 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070949 kubelet[2527]: E0510 00:45:09.070724 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070949 kubelet[2527]: W0510 00:45:09.070731 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070949 kubelet[2527]: E0510 00:45:09.070742 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.070949 kubelet[2527]: E0510 00:45:09.070925 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.070949 kubelet[2527]: W0510 00:45:09.070931 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.070949 kubelet[2527]: E0510 00:45:09.070940 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.071154 kubelet[2527]: E0510 00:45:09.071140 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.071184 kubelet[2527]: W0510 00:45:09.071160 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.071184 kubelet[2527]: E0510 00:45:09.071172 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.071724 kubelet[2527]: E0510 00:45:09.071708 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.071762 kubelet[2527]: W0510 00:45:09.071725 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.071807 kubelet[2527]: E0510 00:45:09.071796 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.071935 kubelet[2527]: E0510 00:45:09.071925 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.071969 kubelet[2527]: W0510 00:45:09.071936 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.071969 kubelet[2527]: E0510 00:45:09.071944 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.072160 kubelet[2527]: E0510 00:45:09.072148 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.072160 kubelet[2527]: W0510 00:45:09.072160 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.072240 kubelet[2527]: E0510 00:45:09.072169 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.072355 kubelet[2527]: E0510 00:45:09.072345 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.072385 kubelet[2527]: W0510 00:45:09.072355 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.072385 kubelet[2527]: E0510 00:45:09.072362 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.072640 kubelet[2527]: E0510 00:45:09.072629 2527 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:09.072672 kubelet[2527]: W0510 00:45:09.072640 2527 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:09.072672 kubelet[2527]: E0510 00:45:09.072649 2527 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:09.149749 env[1555]: time="2025-05-10T00:45:09.149690250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.152637 env[1555]: time="2025-05-10T00:45:09.152589862Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.155532 env[1555]: time="2025-05-10T00:45:09.155496871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.158372 env[1555]: time="2025-05-10T00:45:09.158317441Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:09.158606 env[1555]: time="2025-05-10T00:45:09.158580288Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:45:09.161349 env[1555]: time="2025-05-10T00:45:09.161320317Z" level=info msg="CreateContainer within sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:45:09.177464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount984287960.mount: Deactivated successfully. May 10 00:45:09.182848 env[1555]: time="2025-05-10T00:45:09.182790277Z" level=info msg="CreateContainer within sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675\"" May 10 00:45:09.183559 env[1555]: time="2025-05-10T00:45:09.183494798Z" level=info msg="StartContainer for \"7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675\"" May 10 00:45:09.205033 systemd[1]: Started cri-containerd-7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675.scope. May 10 00:45:09.239000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.239000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f23f359b138 items=0 ppid=3093 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383461613564623966313734393731343964336335643036333064 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit: BPF prog-id=130 op=LOAD May 10 00:45:09.240000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000182698 items=0 ppid=3093 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383461613564623966313734393731343964336335643036333064 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit: BPF prog-id=131 op=LOAD May 10 00:45:09.240000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001826e8 items=0 ppid=3093 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383461613564623966313734393731343964336335643036333064 May 10 00:45:09.240000 audit: BPF prog-id=131 op=UNLOAD May 10 00:45:09.240000 audit: BPF prog-id=130 op=UNLOAD May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { perfmon } for pid=3254 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit[3254]: AVC avc: denied { bpf } for pid=3254 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:09.240000 audit: BPF prog-id=132 op=LOAD May 10 00:45:09.240000 audit[3254]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000182778 items=0 ppid=3093 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:09.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764383461613564623966313734393731343964336335643036333064 May 10 00:45:09.263684 env[1555]: time="2025-05-10T00:45:09.263614162Z" level=info msg="StartContainer for \"7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675\" returns successfully" May 10 00:45:09.278306 systemd[1]: cri-containerd-7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675.scope: Deactivated successfully. May 10 00:45:09.279000 audit: BPF prog-id=132 op=UNLOAD May 10 00:45:09.328941 env[1555]: time="2025-05-10T00:45:09.325802804Z" level=info msg="shim disconnected" id=7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675 May 10 00:45:09.328941 env[1555]: time="2025-05-10T00:45:09.325848331Z" level=warning msg="cleaning up after shim disconnected" id=7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675 namespace=k8s.io May 10 00:45:09.328941 env[1555]: time="2025-05-10T00:45:09.325861614Z" level=info msg="cleaning up dead shim" May 10 00:45:09.339850 env[1555]: time="2025-05-10T00:45:09.339522916Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3295 runtime=io.containerd.runc.v2\n" May 10 00:45:09.676243 systemd[1]: run-containerd-runc-k8s.io-7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675-runc.TMLVjj.mount: Deactivated successfully. May 10 00:45:09.676357 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675-rootfs.mount: Deactivated successfully. May 10 00:45:09.940899 env[1555]: time="2025-05-10T00:45:09.940775886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:45:09.962984 kubelet[2527]: I0510 00:45:09.962932 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-8686587c7f-r9tgv" podStartSLOduration=3.531059177 podStartE2EDuration="5.962907281s" podCreationTimestamp="2025-05-10 00:45:04 +0000 UTC" firstStartedPulling="2025-05-10 00:45:05.232879425 +0000 UTC m=+21.581599583" lastFinishedPulling="2025-05-10 00:45:07.664727509 +0000 UTC m=+24.013447687" observedRunningTime="2025-05-10 00:45:07.950330617 +0000 UTC m=+24.299050793" watchObservedRunningTime="2025-05-10 00:45:09.962907281 +0000 UTC m=+26.311627736" May 10 00:45:10.787773 kubelet[2527]: E0510 00:45:10.787730 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:12.788210 kubelet[2527]: E0510 00:45:12.787433 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:14.788446 kubelet[2527]: E0510 00:45:14.788007 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:15.356830 env[1555]: time="2025-05-10T00:45:15.356775738Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:15.359492 env[1555]: time="2025-05-10T00:45:15.359414289Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:15.361817 env[1555]: time="2025-05-10T00:45:15.361776118Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:15.363518 env[1555]: time="2025-05-10T00:45:15.363479403Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:15.363890 env[1555]: time="2025-05-10T00:45:15.363859815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:45:15.366756 env[1555]: time="2025-05-10T00:45:15.366726174Z" level=info msg="CreateContainer within sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:45:15.396313 env[1555]: time="2025-05-10T00:45:15.396267314Z" level=info msg="CreateContainer within sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd\"" May 10 00:45:15.398338 env[1555]: time="2025-05-10T00:45:15.396931235Z" level=info msg="StartContainer for \"56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd\"" May 10 00:45:15.438782 systemd[1]: run-containerd-runc-k8s.io-56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd-runc.weASRe.mount: Deactivated successfully. May 10 00:45:15.443222 systemd[1]: Started cri-containerd-56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd.scope. May 10 00:45:15.486363 kernel: kauditd_printk_skb: 91 callbacks suppressed May 10 00:45:15.486530 kernel: audit: type=1400 audit(1746837915.477:997): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6e271897b8 items=0 ppid=3093 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.496363 kernel: audit: type=1300 audit(1746837915.477:997): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6e271897b8 items=0 ppid=3093 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623265303763616433343138613665646632616164663134346666 May 10 00:45:15.507101 kernel: audit: type=1327 audit(1746837915.477:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623265303763616433343138613665646632616164663134346666 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.516149 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.534907 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.543332 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.543425 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.552305 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.556302 env[1555]: time="2025-05-10T00:45:15.552786651Z" level=info msg="StartContainer for \"56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd\" returns successfully" May 10 00:45:15.560225 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.560355 kernel: audit: type=1400 audit(1746837915.477:998): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit: BPF prog-id=133 op=LOAD May 10 00:45:15.477000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003b6258 items=0 ppid=3093 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623265303763616433343138613665646632616164663134346666 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit: BPF prog-id=134 op=LOAD May 10 00:45:15.477000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003b62a8 items=0 ppid=3093 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623265303763616433343138613665646632616164663134346666 May 10 00:45:15.477000 audit: BPF prog-id=134 op=UNLOAD May 10 00:45:15.477000 audit: BPF prog-id=133 op=UNLOAD May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:15.477000 audit: BPF prog-id=135 op=LOAD May 10 00:45:15.477000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b6338 items=0 ppid=3093 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623265303763616433343138613665646632616164663134346666 May 10 00:45:16.340418 env[1555]: time="2025-05-10T00:45:16.340372645Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:45:16.342520 systemd[1]: cri-containerd-56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd.scope: Deactivated successfully. May 10 00:45:16.345000 audit: BPF prog-id=135 op=UNLOAD May 10 00:45:16.372546 env[1555]: time="2025-05-10T00:45:16.372498644Z" level=info msg="shim disconnected" id=56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd May 10 00:45:16.373101 env[1555]: time="2025-05-10T00:45:16.373043523Z" level=warning msg="cleaning up after shim disconnected" id=56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd namespace=k8s.io May 10 00:45:16.373101 env[1555]: time="2025-05-10T00:45:16.373071512Z" level=info msg="cleaning up dead shim" May 10 00:45:16.381039 env[1555]: time="2025-05-10T00:45:16.380995355Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3363 runtime=io.containerd.runc.v2\n" May 10 00:45:16.387123 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd-rootfs.mount: Deactivated successfully. May 10 00:45:16.447816 kubelet[2527]: I0510 00:45:16.446877 2527 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:45:16.486557 kubelet[2527]: I0510 00:45:16.486521 2527 topology_manager.go:215] "Topology Admit Handler" podUID="bf9759ae-f374-4ba3-948b-984e26a40b4e" podNamespace="kube-system" podName="coredns-7db6d8ff4d-4rdss" May 10 00:45:16.491250 kubelet[2527]: I0510 00:45:16.491221 2527 topology_manager.go:215] "Topology Admit Handler" podUID="0c54eec8-cab2-48da-8d47-62c559879343" podNamespace="kube-system" podName="coredns-7db6d8ff4d-zt2wb" May 10 00:45:16.491603 systemd[1]: Created slice kubepods-burstable-podbf9759ae_f374_4ba3_948b_984e26a40b4e.slice. May 10 00:45:16.494586 kubelet[2527]: I0510 00:45:16.494556 2527 topology_manager.go:215] "Topology Admit Handler" podUID="a391f88f-8f1f-414e-8d1f-6cd0df0cb271" podNamespace="calico-system" podName="calico-kube-controllers-86bf69bcdf-7tmvh" May 10 00:45:16.495363 kubelet[2527]: I0510 00:45:16.495335 2527 topology_manager.go:215] "Topology Admit Handler" podUID="79ddf9c0-41ca-4fb7-aa65-dc07e519acd4" podNamespace="calico-apiserver" podName="calico-apiserver-54f546bcdc-w8b2z" May 10 00:45:16.497269 kubelet[2527]: I0510 00:45:16.497240 2527 topology_manager.go:215] "Topology Admit Handler" podUID="b3e5a4ee-1359-4f1e-84c5-e3c53962ca17" podNamespace="calico-apiserver" podName="calico-apiserver-cb89df8f5-dqlmh" May 10 00:45:16.497947 kubelet[2527]: I0510 00:45:16.497922 2527 topology_manager.go:215] "Topology Admit Handler" podUID="39c8f9b3-ad10-496b-998d-2c423031e9dc" podNamespace="calico-apiserver" podName="calico-apiserver-54f546bcdc-2n7hz" May 10 00:45:16.503963 systemd[1]: Created slice kubepods-burstable-pod0c54eec8_cab2_48da_8d47_62c559879343.slice. May 10 00:45:16.514117 systemd[1]: Created slice kubepods-besteffort-poda391f88f_8f1f_414e_8d1f_6cd0df0cb271.slice. May 10 00:45:16.524316 systemd[1]: Created slice kubepods-besteffort-pod79ddf9c0_41ca_4fb7_aa65_dc07e519acd4.slice. May 10 00:45:16.532202 systemd[1]: Created slice kubepods-besteffort-podb3e5a4ee_1359_4f1e_84c5_e3c53962ca17.slice. May 10 00:45:16.540574 systemd[1]: Created slice kubepods-besteffort-pod39c8f9b3_ad10_496b_998d_2c423031e9dc.slice. May 10 00:45:16.632506 kubelet[2527]: I0510 00:45:16.632383 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mbr66\" (UniqueName: \"kubernetes.io/projected/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-kube-api-access-mbr66\") pod \"calico-apiserver-54f546bcdc-w8b2z\" (UID: \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\") " pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" May 10 00:45:16.632506 kubelet[2527]: I0510 00:45:16.632431 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bf9759ae-f374-4ba3-948b-984e26a40b4e-config-volume\") pod \"coredns-7db6d8ff4d-4rdss\" (UID: \"bf9759ae-f374-4ba3-948b-984e26a40b4e\") " pod="kube-system/coredns-7db6d8ff4d-4rdss" May 10 00:45:16.632506 kubelet[2527]: I0510 00:45:16.632452 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhrhl\" (UniqueName: \"kubernetes.io/projected/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-kube-api-access-qhrhl\") pod \"calico-kube-controllers-86bf69bcdf-7tmvh\" (UID: \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\") " pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" May 10 00:45:16.632506 kubelet[2527]: I0510 00:45:16.632507 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0c54eec8-cab2-48da-8d47-62c559879343-config-volume\") pod \"coredns-7db6d8ff4d-zt2wb\" (UID: \"0c54eec8-cab2-48da-8d47-62c559879343\") " pod="kube-system/coredns-7db6d8ff4d-zt2wb" May 10 00:45:16.632756 kubelet[2527]: I0510 00:45:16.632530 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b3e5a4ee-1359-4f1e-84c5-e3c53962ca17-calico-apiserver-certs\") pod \"calico-apiserver-cb89df8f5-dqlmh\" (UID: \"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17\") " pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" May 10 00:45:16.632756 kubelet[2527]: I0510 00:45:16.632547 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7t7p\" (UniqueName: \"kubernetes.io/projected/b3e5a4ee-1359-4f1e-84c5-e3c53962ca17-kube-api-access-f7t7p\") pod \"calico-apiserver-cb89df8f5-dqlmh\" (UID: \"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17\") " pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" May 10 00:45:16.632756 kubelet[2527]: I0510 00:45:16.632564 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39c8f9b3-ad10-496b-998d-2c423031e9dc-calico-apiserver-certs\") pod \"calico-apiserver-54f546bcdc-2n7hz\" (UID: \"39c8f9b3-ad10-496b-998d-2c423031e9dc\") " pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" May 10 00:45:16.632756 kubelet[2527]: I0510 00:45:16.632580 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ks28d\" (UniqueName: \"kubernetes.io/projected/39c8f9b3-ad10-496b-998d-2c423031e9dc-kube-api-access-ks28d\") pod \"calico-apiserver-54f546bcdc-2n7hz\" (UID: \"39c8f9b3-ad10-496b-998d-2c423031e9dc\") " pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" May 10 00:45:16.632756 kubelet[2527]: I0510 00:45:16.632595 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d789g\" (UniqueName: \"kubernetes.io/projected/bf9759ae-f374-4ba3-948b-984e26a40b4e-kube-api-access-d789g\") pod \"coredns-7db6d8ff4d-4rdss\" (UID: \"bf9759ae-f374-4ba3-948b-984e26a40b4e\") " pod="kube-system/coredns-7db6d8ff4d-4rdss" May 10 00:45:16.632899 kubelet[2527]: I0510 00:45:16.632612 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-tigera-ca-bundle\") pod \"calico-kube-controllers-86bf69bcdf-7tmvh\" (UID: \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\") " pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" May 10 00:45:16.632899 kubelet[2527]: I0510 00:45:16.632630 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7rtr\" (UniqueName: \"kubernetes.io/projected/0c54eec8-cab2-48da-8d47-62c559879343-kube-api-access-z7rtr\") pod \"coredns-7db6d8ff4d-zt2wb\" (UID: \"0c54eec8-cab2-48da-8d47-62c559879343\") " pod="kube-system/coredns-7db6d8ff4d-zt2wb" May 10 00:45:16.632899 kubelet[2527]: I0510 00:45:16.632645 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-calico-apiserver-certs\") pod \"calico-apiserver-54f546bcdc-w8b2z\" (UID: \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\") " pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" May 10 00:45:16.792390 systemd[1]: Created slice kubepods-besteffort-podbb27db3f_e255_4e8f_8959_a138791be4d5.slice. May 10 00:45:16.794751 env[1555]: time="2025-05-10T00:45:16.794713362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rdss,Uid:bf9759ae-f374-4ba3-948b-984e26a40b4e,Namespace:kube-system,Attempt:0,}" May 10 00:45:16.795457 env[1555]: time="2025-05-10T00:45:16.795281526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2gfcq,Uid:bb27db3f-e255-4e8f-8959-a138791be4d5,Namespace:calico-system,Attempt:0,}" May 10 00:45:16.809882 env[1555]: time="2025-05-10T00:45:16.809835809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt2wb,Uid:0c54eec8-cab2-48da-8d47-62c559879343,Namespace:kube-system,Attempt:0,}" May 10 00:45:16.823490 env[1555]: time="2025-05-10T00:45:16.823444809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bf69bcdf-7tmvh,Uid:a391f88f-8f1f-414e-8d1f-6cd0df0cb271,Namespace:calico-system,Attempt:0,}" May 10 00:45:16.828577 env[1555]: time="2025-05-10T00:45:16.828537144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-w8b2z,Uid:79ddf9c0-41ca-4fb7-aa65-dc07e519acd4,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:16.838339 env[1555]: time="2025-05-10T00:45:16.838304741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cb89df8f5-dqlmh,Uid:b3e5a4ee-1359-4f1e-84c5-e3c53962ca17,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:16.844579 env[1555]: time="2025-05-10T00:45:16.844525263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-2n7hz,Uid:39c8f9b3-ad10-496b-998d-2c423031e9dc,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:16.956200 env[1555]: time="2025-05-10T00:45:16.954720172Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:45:17.326388 env[1555]: time="2025-05-10T00:45:17.326223083Z" level=error msg="Failed to destroy network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.327028 env[1555]: time="2025-05-10T00:45:17.326978429Z" level=error msg="encountered an error cleaning up failed sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.327168 env[1555]: time="2025-05-10T00:45:17.327063136Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rdss,Uid:bf9759ae-f374-4ba3-948b-984e26a40b4e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.327587 kubelet[2527]: E0510 00:45:17.327520 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.327785 kubelet[2527]: E0510 00:45:17.327643 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4rdss" May 10 00:45:17.327785 kubelet[2527]: E0510 00:45:17.327674 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-4rdss" May 10 00:45:17.329943 kubelet[2527]: E0510 00:45:17.329894 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-4rdss_kube-system(bf9759ae-f374-4ba3-948b-984e26a40b4e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-4rdss_kube-system(bf9759ae-f374-4ba3-948b-984e26a40b4e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4rdss" podUID="bf9759ae-f374-4ba3-948b-984e26a40b4e" May 10 00:45:17.340918 env[1555]: time="2025-05-10T00:45:17.340851144Z" level=error msg="Failed to destroy network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.341400 env[1555]: time="2025-05-10T00:45:17.341353601Z" level=error msg="encountered an error cleaning up failed sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.341497 env[1555]: time="2025-05-10T00:45:17.341433121Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-w8b2z,Uid:79ddf9c0-41ca-4fb7-aa65-dc07e519acd4,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.342009 kubelet[2527]: E0510 00:45:17.341954 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.342128 kubelet[2527]: E0510 00:45:17.342039 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" May 10 00:45:17.342128 kubelet[2527]: E0510 00:45:17.342092 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" May 10 00:45:17.345426 kubelet[2527]: E0510 00:45:17.345375 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54f546bcdc-w8b2z_calico-apiserver(79ddf9c0-41ca-4fb7-aa65-dc07e519acd4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54f546bcdc-w8b2z_calico-apiserver(79ddf9c0-41ca-4fb7-aa65-dc07e519acd4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" podUID="79ddf9c0-41ca-4fb7-aa65-dc07e519acd4" May 10 00:45:17.352346 env[1555]: time="2025-05-10T00:45:17.352287441Z" level=error msg="Failed to destroy network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.352879 env[1555]: time="2025-05-10T00:45:17.352836422Z" level=error msg="encountered an error cleaning up failed sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.353039 env[1555]: time="2025-05-10T00:45:17.353009038Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cb89df8f5-dqlmh,Uid:b3e5a4ee-1359-4f1e-84c5-e3c53962ca17,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.353475 kubelet[2527]: E0510 00:45:17.353407 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.353575 kubelet[2527]: E0510 00:45:17.353503 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" May 10 00:45:17.353575 kubelet[2527]: E0510 00:45:17.353549 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" May 10 00:45:17.355884 kubelet[2527]: E0510 00:45:17.353626 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-cb89df8f5-dqlmh_calico-apiserver(b3e5a4ee-1359-4f1e-84c5-e3c53962ca17)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-cb89df8f5-dqlmh_calico-apiserver(b3e5a4ee-1359-4f1e-84c5-e3c53962ca17)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" podUID="b3e5a4ee-1359-4f1e-84c5-e3c53962ca17" May 10 00:45:17.359359 env[1555]: time="2025-05-10T00:45:17.359303919Z" level=error msg="Failed to destroy network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.359858 env[1555]: time="2025-05-10T00:45:17.359769116Z" level=error msg="encountered an error cleaning up failed sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.359954 env[1555]: time="2025-05-10T00:45:17.359916578Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bf69bcdf-7tmvh,Uid:a391f88f-8f1f-414e-8d1f-6cd0df0cb271,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.360441 kubelet[2527]: E0510 00:45:17.360379 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.360621 kubelet[2527]: E0510 00:45:17.360468 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" May 10 00:45:17.360693 kubelet[2527]: E0510 00:45:17.360634 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" May 10 00:45:17.360925 kubelet[2527]: E0510 00:45:17.360822 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-86bf69bcdf-7tmvh_calico-system(a391f88f-8f1f-414e-8d1f-6cd0df0cb271)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-86bf69bcdf-7tmvh_calico-system(a391f88f-8f1f-414e-8d1f-6cd0df0cb271)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" podUID="a391f88f-8f1f-414e-8d1f-6cd0df0cb271" May 10 00:45:17.363487 env[1555]: time="2025-05-10T00:45:17.363441772Z" level=error msg="Failed to destroy network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.364028 env[1555]: time="2025-05-10T00:45:17.363986212Z" level=error msg="encountered an error cleaning up failed sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.364223 env[1555]: time="2025-05-10T00:45:17.364188025Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2gfcq,Uid:bb27db3f-e255-4e8f-8959-a138791be4d5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.364532 kubelet[2527]: E0510 00:45:17.364499 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.364619 kubelet[2527]: E0510 00:45:17.364573 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:17.364619 kubelet[2527]: E0510 00:45:17.364602 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2gfcq" May 10 00:45:17.364730 kubelet[2527]: E0510 00:45:17.364699 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2gfcq_calico-system(bb27db3f-e255-4e8f-8959-a138791be4d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2gfcq_calico-system(bb27db3f-e255-4e8f-8959-a138791be4d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:17.368791 env[1555]: time="2025-05-10T00:45:17.368737553Z" level=error msg="Failed to destroy network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.369161 env[1555]: time="2025-05-10T00:45:17.369123643Z" level=error msg="encountered an error cleaning up failed sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.369253 env[1555]: time="2025-05-10T00:45:17.369185623Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt2wb,Uid:0c54eec8-cab2-48da-8d47-62c559879343,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.369669 kubelet[2527]: E0510 00:45:17.369393 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.369669 kubelet[2527]: E0510 00:45:17.369466 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-zt2wb" May 10 00:45:17.369669 kubelet[2527]: E0510 00:45:17.369507 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-zt2wb" May 10 00:45:17.369875 kubelet[2527]: E0510 00:45:17.369609 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-zt2wb_kube-system(0c54eec8-cab2-48da-8d47-62c559879343)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-zt2wb_kube-system(0c54eec8-cab2-48da-8d47-62c559879343)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zt2wb" podUID="0c54eec8-cab2-48da-8d47-62c559879343" May 10 00:45:17.379574 env[1555]: time="2025-05-10T00:45:17.379515446Z" level=error msg="Failed to destroy network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.380305 env[1555]: time="2025-05-10T00:45:17.380247892Z" level=error msg="encountered an error cleaning up failed sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.380423 env[1555]: time="2025-05-10T00:45:17.380348757Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-2n7hz,Uid:39c8f9b3-ad10-496b-998d-2c423031e9dc,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.380682 kubelet[2527]: E0510 00:45:17.380635 2527 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:17.380792 kubelet[2527]: E0510 00:45:17.380705 2527 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" May 10 00:45:17.380792 kubelet[2527]: E0510 00:45:17.380731 2527 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" May 10 00:45:17.382119 kubelet[2527]: E0510 00:45:17.380797 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54f546bcdc-2n7hz_calico-apiserver(39c8f9b3-ad10-496b-998d-2c423031e9dc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54f546bcdc-2n7hz_calico-apiserver(39c8f9b3-ad10-496b-998d-2c423031e9dc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" podUID="39c8f9b3-ad10-496b-998d-2c423031e9dc" May 10 00:45:17.955988 kubelet[2527]: I0510 00:45:17.955952 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:17.957845 kubelet[2527]: I0510 00:45:17.957562 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:17.964433 kubelet[2527]: I0510 00:45:17.964405 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:17.966762 kubelet[2527]: I0510 00:45:17.965941 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:17.966883 env[1555]: time="2025-05-10T00:45:17.966284296Z" level=info msg="StopPodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\"" May 10 00:45:17.967147 env[1555]: time="2025-05-10T00:45:17.967125373Z" level=info msg="StopPodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\"" May 10 00:45:17.967255 env[1555]: time="2025-05-10T00:45:17.967229664Z" level=info msg="StopPodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\"" May 10 00:45:17.968972 env[1555]: time="2025-05-10T00:45:17.967757751Z" level=info msg="StopPodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\"" May 10 00:45:17.970033 kubelet[2527]: I0510 00:45:17.970013 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:17.970783 env[1555]: time="2025-05-10T00:45:17.970471742Z" level=info msg="StopPodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\"" May 10 00:45:17.973100 kubelet[2527]: I0510 00:45:17.972724 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:17.973467 env[1555]: time="2025-05-10T00:45:17.973415988Z" level=info msg="StopPodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\"" May 10 00:45:17.974964 kubelet[2527]: I0510 00:45:17.974608 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:17.975463 env[1555]: time="2025-05-10T00:45:17.975433001Z" level=info msg="StopPodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\"" May 10 00:45:18.115309 env[1555]: time="2025-05-10T00:45:18.115212894Z" level=error msg="StopPodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" failed" error="failed to destroy network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.116144 kubelet[2527]: E0510 00:45:18.115503 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:18.116144 kubelet[2527]: E0510 00:45:18.115572 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa"} May 10 00:45:18.116144 kubelet[2527]: E0510 00:45:18.115650 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.116144 kubelet[2527]: E0510 00:45:18.115681 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" podUID="b3e5a4ee-1359-4f1e-84c5-e3c53962ca17" May 10 00:45:18.130000 env[1555]: time="2025-05-10T00:45:18.129926405Z" level=error msg="StopPodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" failed" error="failed to destroy network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.130652 kubelet[2527]: E0510 00:45:18.130424 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:18.130652 kubelet[2527]: E0510 00:45:18.130512 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7"} May 10 00:45:18.130652 kubelet[2527]: E0510 00:45:18.130571 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.130652 kubelet[2527]: E0510 00:45:18.130605 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" podUID="79ddf9c0-41ca-4fb7-aa65-dc07e519acd4" May 10 00:45:18.157144 env[1555]: time="2025-05-10T00:45:18.157060825Z" level=error msg="StopPodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" failed" error="failed to destroy network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.157862 kubelet[2527]: E0510 00:45:18.157673 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:18.157862 kubelet[2527]: E0510 00:45:18.157746 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348"} May 10 00:45:18.157862 kubelet[2527]: E0510 00:45:18.157791 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"39c8f9b3-ad10-496b-998d-2c423031e9dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.157862 kubelet[2527]: E0510 00:45:18.157823 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"39c8f9b3-ad10-496b-998d-2c423031e9dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" podUID="39c8f9b3-ad10-496b-998d-2c423031e9dc" May 10 00:45:18.186487 env[1555]: time="2025-05-10T00:45:18.186419539Z" level=error msg="StopPodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" failed" error="failed to destroy network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.186961 kubelet[2527]: E0510 00:45:18.186905 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:18.187071 kubelet[2527]: E0510 00:45:18.186978 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545"} May 10 00:45:18.187071 kubelet[2527]: E0510 00:45:18.187036 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bb27db3f-e255-4e8f-8959-a138791be4d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.187227 kubelet[2527]: E0510 00:45:18.187066 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bb27db3f-e255-4e8f-8959-a138791be4d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2gfcq" podUID="bb27db3f-e255-4e8f-8959-a138791be4d5" May 10 00:45:18.188739 env[1555]: time="2025-05-10T00:45:18.188686390Z" level=error msg="StopPodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" failed" error="failed to destroy network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.189121 kubelet[2527]: E0510 00:45:18.189055 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:18.189215 kubelet[2527]: E0510 00:45:18.189113 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89"} May 10 00:45:18.189215 kubelet[2527]: E0510 00:45:18.189172 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.189215 kubelet[2527]: E0510 00:45:18.189202 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" podUID="a391f88f-8f1f-414e-8d1f-6cd0df0cb271" May 10 00:45:18.194385 env[1555]: time="2025-05-10T00:45:18.194323355Z" level=error msg="StopPodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" failed" error="failed to destroy network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.194962 kubelet[2527]: E0510 00:45:18.194757 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:18.194962 kubelet[2527]: E0510 00:45:18.194810 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529"} May 10 00:45:18.194962 kubelet[2527]: E0510 00:45:18.194858 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bf9759ae-f374-4ba3-948b-984e26a40b4e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.194962 kubelet[2527]: E0510 00:45:18.194892 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bf9759ae-f374-4ba3-948b-984e26a40b4e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-4rdss" podUID="bf9759ae-f374-4ba3-948b-984e26a40b4e" May 10 00:45:18.198340 env[1555]: time="2025-05-10T00:45:18.198276085Z" level=error msg="StopPodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" failed" error="failed to destroy network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:18.198888 kubelet[2527]: E0510 00:45:18.198701 2527 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:18.198888 kubelet[2527]: E0510 00:45:18.198756 2527 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a"} May 10 00:45:18.198888 kubelet[2527]: E0510 00:45:18.198804 2527 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0c54eec8-cab2-48da-8d47-62c559879343\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:18.198888 kubelet[2527]: E0510 00:45:18.198834 2527 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0c54eec8-cab2-48da-8d47-62c559879343\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-zt2wb" podUID="0c54eec8-cab2-48da-8d47-62c559879343" May 10 00:45:23.318371 systemd[1]: Started sshd@9-172.31.18.109:22-139.178.89.65:54482.service. May 10 00:45:23.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.109:22-139.178.89.65:54482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:23.333031 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:45:23.333934 kernel: audit: type=1130 audit(1746837923.318:1004): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.109:22-139.178.89.65:54482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:23.555000 audit[3759]: USER_ACCT pid=3759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.560140 sshd[3759]: Accepted publickey for core from 139.178.89.65 port 54482 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:23.569099 kernel: audit: type=1101 audit(1746837923.555:1005): pid=3759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.569000 audit[3759]: CRED_ACQ pid=3759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.581138 kernel: audit: type=1103 audit(1746837923.569:1006): pid=3759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.569000 audit[3759]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb4ab0c0 a2=3 a3=0 items=0 ppid=1 pid=3759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:23.599063 kernel: audit: type=1006 audit(1746837923.569:1007): pid=3759 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:45:23.599209 kernel: audit: type=1300 audit(1746837923.569:1007): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb4ab0c0 a2=3 a3=0 items=0 ppid=1 pid=3759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:23.599932 sshd[3759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:23.602148 kernel: audit: type=1327 audit(1746837923.569:1007): proctitle=737368643A20636F7265205B707269765D May 10 00:45:23.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:23.621472 systemd[1]: Started session-10.scope. May 10 00:45:23.622221 systemd-logind[1540]: New session 10 of user core. May 10 00:45:23.629000 audit[3759]: USER_START pid=3759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.643209 kernel: audit: type=1105 audit(1746837923.629:1008): pid=3759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.646000 audit[3761]: CRED_ACQ pid=3761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:23.658197 kernel: audit: type=1103 audit(1746837923.646:1009): pid=3761 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:24.108782 sshd[3759]: pam_unix(sshd:session): session closed for user core May 10 00:45:24.110000 audit[3759]: USER_END pid=3759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:24.113282 systemd[1]: sshd@9-172.31.18.109:22-139.178.89.65:54482.service: Deactivated successfully. May 10 00:45:24.114322 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:45:24.117152 systemd-logind[1540]: Session 10 logged out. Waiting for processes to exit. May 10 00:45:24.118548 systemd-logind[1540]: Removed session 10. May 10 00:45:24.123120 kernel: audit: type=1106 audit(1746837924.110:1010): pid=3759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:24.110000 audit[3759]: CRED_DISP pid=3759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:24.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.109:22-139.178.89.65:54482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:24.134498 kernel: audit: type=1104 audit(1746837924.110:1011): pid=3759 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:24.938712 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2495208181.mount: Deactivated successfully. May 10 00:45:24.988820 env[1555]: time="2025-05-10T00:45:24.988754677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.992910 env[1555]: time="2025-05-10T00:45:24.992862865Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.994760 env[1555]: time="2025-05-10T00:45:24.994723968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.996293 env[1555]: time="2025-05-10T00:45:24.996257893Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.996706 env[1555]: time="2025-05-10T00:45:24.996658625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:45:25.028999 env[1555]: time="2025-05-10T00:45:25.028962157Z" level=info msg="CreateContainer within sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:45:25.086607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount561953924.mount: Deactivated successfully. May 10 00:45:25.095263 env[1555]: time="2025-05-10T00:45:25.095204058Z" level=info msg="CreateContainer within sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\"" May 10 00:45:25.096916 env[1555]: time="2025-05-10T00:45:25.095898614Z" level=info msg="StartContainer for \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\"" May 10 00:45:25.116362 systemd[1]: Started cri-containerd-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d.scope. May 10 00:45:25.140000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.140000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f0de448b018 items=0 ppid=3093 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396463623162323663323532353236656236316632383261343935 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit: BPF prog-id=136 op=LOAD May 10 00:45:25.141000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000388208 items=0 ppid=3093 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396463623162323663323532353236656236316632383261343935 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit: BPF prog-id=137 op=LOAD May 10 00:45:25.141000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000388258 items=0 ppid=3093 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396463623162323663323532353236656236316632383261343935 May 10 00:45:25.141000 audit: BPF prog-id=137 op=UNLOAD May 10 00:45:25.141000 audit: BPF prog-id=136 op=UNLOAD May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { perfmon } for pid=3781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit[3781]: AVC avc: denied { bpf } for pid=3781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.141000 audit: BPF prog-id=138 op=LOAD May 10 00:45:25.141000 audit[3781]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003882e8 items=0 ppid=3093 pid=3781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161396463623162323663323532353236656236316632383261343935 May 10 00:45:25.159441 env[1555]: time="2025-05-10T00:45:25.159394969Z" level=info msg="StartContainer for \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\" returns successfully" May 10 00:45:25.906364 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:45:25.906544 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:45:26.119162 systemd[1]: run-containerd-runc-k8s.io-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d-runc.cyTskG.mount: Deactivated successfully. May 10 00:45:27.050525 systemd[1]: run-containerd-runc-k8s.io-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d-runc.sj4Q47.mount: Deactivated successfully. May 10 00:45:27.491000 audit[3918]: AVC avc: denied { write } for pid=3918 comm="tee" name="fd" dev="proc" ino=26114 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.491000 audit[3918]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1e343a1d a2=241 a3=1b6 items=1 ppid=3889 pid=3918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.491000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:45:27.491000 audit: PATH item=0 name="/dev/fd/63" inode=26093 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.491000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:27.501000 audit[3922]: AVC avc: denied { write } for pid=3922 comm="tee" name="fd" dev="proc" ino=25040 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.501000 audit[3922]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9ba32a0d a2=241 a3=1b6 items=1 ppid=3893 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.501000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:45:27.501000 audit: PATH item=0 name="/dev/fd/63" inode=26096 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.501000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:27.511000 audit[3924]: AVC avc: denied { write } for pid=3924 comm="tee" name="fd" dev="proc" ino=26121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.511000 audit[3924]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe937caa1c a2=241 a3=1b6 items=1 ppid=3891 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.511000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:45:27.511000 audit: PATH item=0 name="/dev/fd/63" inode=25028 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.511000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:27.515000 audit[3951]: AVC avc: denied { write } for pid=3951 comm="tee" name="fd" dev="proc" ino=25049 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.515000 audit[3951]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3f591a1e a2=241 a3=1b6 items=1 ppid=3899 pid=3951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.517000 audit[3947]: AVC avc: denied { write } for pid=3947 comm="tee" name="fd" dev="proc" ino=25053 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.517000 audit[3947]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeec250a0c a2=241 a3=1b6 items=1 ppid=3902 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.517000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:45:27.517000 audit: PATH item=0 name="/dev/fd/63" inode=25037 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.515000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:45:27.515000 audit: PATH item=0 name="/dev/fd/63" inode=25045 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.515000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:27.540000 audit[3956]: AVC avc: denied { write } for pid=3956 comm="tee" name="fd" dev="proc" ino=26128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:27.553000 audit[3959]: AVC avc: denied { write } for pid=3959 comm="tee" name="fd" dev="proc" ino=26131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:27.540000 audit[3956]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd838ea1c a2=241 a3=1b6 items=1 ppid=3897 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.540000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:45:27.540000 audit: PATH item=0 name="/dev/fd/63" inode=26118 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.540000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:27.553000 audit[3959]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc981ea1c a2=241 a3=1b6 items=1 ppid=3912 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:27.553000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:45:27.553000 audit: PATH item=0 name="/dev/fd/63" inode=25046 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:27.553000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:28.788448 env[1555]: time="2025-05-10T00:45:28.788383925Z" level=info msg="StopPodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\"" May 10 00:45:28.901709 kubelet[2527]: I0510 00:45:28.897463 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-fkn5l" podStartSLOduration=5.179886318 podStartE2EDuration="24.89392867s" podCreationTimestamp="2025-05-10 00:45:04 +0000 UTC" firstStartedPulling="2025-05-10 00:45:05.283605471 +0000 UTC m=+21.632325642" lastFinishedPulling="2025-05-10 00:45:24.997647835 +0000 UTC m=+41.346367994" observedRunningTime="2025-05-10 00:45:26.132973694 +0000 UTC m=+42.481693873" watchObservedRunningTime="2025-05-10 00:45:28.89392867 +0000 UTC m=+45.242648910" May 10 00:45:29.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.109:22-139.178.89.65:52294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:29.134711 systemd[1]: Started sshd@10-172.31.18.109:22-139.178.89.65:52294.service. May 10 00:45:29.142974 kernel: kauditd_printk_skb: 79 callbacks suppressed May 10 00:45:29.143946 kernel: audit: type=1130 audit(1746837929.133:1026): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.109:22-139.178.89.65:52294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:29.353000 audit[4023]: USER_ACCT pid=4023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.365559 sshd[4023]: Accepted publickey for core from 139.178.89.65 port 52294 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:29.366392 kernel: audit: type=1101 audit(1746837929.353:1027): pid=4023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.367936 sshd[4023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:29.364000 audit[4023]: CRED_ACQ pid=4023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.379170 kernel: audit: type=1103 audit(1746837929.364:1028): pid=4023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:28.894 [INFO][4010] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:28.897 [INFO][4010] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" iface="eth0" netns="/var/run/netns/cni-9e58e3d1-52bd-9fab-1dfb-ac1d82306014" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:28.897 [INFO][4010] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" iface="eth0" netns="/var/run/netns/cni-9e58e3d1-52bd-9fab-1dfb-ac1d82306014" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:28.900 [INFO][4010] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" iface="eth0" netns="/var/run/netns/cni-9e58e3d1-52bd-9fab-1dfb-ac1d82306014" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:28.900 [INFO][4010] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:28.900 [INFO][4010] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.328 [INFO][4017] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.333 [INFO][4017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.334 [INFO][4017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.352 [WARNING][4017] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.352 [INFO][4017] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.354 [INFO][4017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:29.379753 env[1555]: 2025-05-10 00:45:29.367 [INFO][4010] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:29.383901 env[1555]: time="2025-05-10T00:45:29.383850531Z" level=info msg="TearDown network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" successfully" May 10 00:45:29.384064 env[1555]: time="2025-05-10T00:45:29.384037987Z" level=info msg="StopPodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" returns successfully" May 10 00:45:29.386546 systemd[1]: run-netns-cni\x2d9e58e3d1\x2d52bd\x2d9fab\x2d1dfb\x2dac1d82306014.mount: Deactivated successfully. May 10 00:45:29.389055 systemd-logind[1540]: New session 11 of user core. May 10 00:45:29.391916 kernel: audit: type=1006 audit(1746837929.364:1029): pid=4023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:45:29.389827 systemd[1]: Started session-11.scope. May 10 00:45:29.364000 audit[4023]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcf61b840 a2=3 a3=0 items=0 ppid=1 pid=4023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.400543 env[1555]: time="2025-05-10T00:45:29.399424905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2gfcq,Uid:bb27db3f-e255-4e8f-8959-a138791be4d5,Namespace:calico-system,Attempt:1,}" May 10 00:45:29.407274 kernel: audit: type=1300 audit(1746837929.364:1029): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcf61b840 a2=3 a3=0 items=0 ppid=1 pid=4023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.407398 kernel: audit: type=1327 audit(1746837929.364:1029): proctitle=737368643A20636F7265205B707269765D May 10 00:45:29.364000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:29.406000 audit[4023]: USER_START pid=4023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.416259 kernel: audit: type=1105 audit(1746837929.406:1030): pid=4023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.421000 audit[4026]: CRED_ACQ pid=4026 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.432301 kernel: audit: type=1103 audit(1746837929.421:1031): pid=4026 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:29.616228 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali556b1b911c9: link becomes ready May 10 00:45:29.627728 systemd-networkd[1276]: cali556b1b911c9: Link UP May 10 00:45:29.628607 systemd-networkd[1276]: cali556b1b911c9: Gained carrier May 10 00:45:29.629448 (udev-worker)[4053]: Network interface NamePolicy= disabled on kernel command line. May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.466 [INFO][4028] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.480 [INFO][4028] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0 csi-node-driver- calico-system bb27db3f-e255-4e8f-8959-a138791be4d5 809 0 2025-05-10 00:45:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-18-109 csi-node-driver-2gfcq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali556b1b911c9 [] []}} ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.481 [INFO][4028] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.534 [INFO][4041] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" HandleID="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.549 [INFO][4041] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" HandleID="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a47b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-18-109", "pod":"csi-node-driver-2gfcq", "timestamp":"2025-05-10 00:45:29.533999201 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.549 [INFO][4041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.549 [INFO][4041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.549 [INFO][4041] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.552 [INFO][4041] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.566 [INFO][4041] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.573 [INFO][4041] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.576 [INFO][4041] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.582 [INFO][4041] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.582 [INFO][4041] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.584 [INFO][4041] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.589 [INFO][4041] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.595 [INFO][4041] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.65/26] block=192.168.54.64/26 handle="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.595 [INFO][4041] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.65/26] handle="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" host="ip-172-31-18-109" May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.595 [INFO][4041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:29.644850 env[1555]: 2025-05-10 00:45:29.595 [INFO][4041] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.65/26] IPv6=[] ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" HandleID="k8s-pod-network.e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.646664 env[1555]: 2025-05-10 00:45:29.598 [INFO][4028] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb27db3f-e255-4e8f-8959-a138791be4d5", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"csi-node-driver-2gfcq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali556b1b911c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:29.646664 env[1555]: 2025-05-10 00:45:29.598 [INFO][4028] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.65/32] ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.646664 env[1555]: 2025-05-10 00:45:29.598 [INFO][4028] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali556b1b911c9 ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.646664 env[1555]: 2025-05-10 00:45:29.616 [INFO][4028] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.646664 env[1555]: 2025-05-10 00:45:29.616 [INFO][4028] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb27db3f-e255-4e8f-8959-a138791be4d5", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b", Pod:"csi-node-driver-2gfcq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali556b1b911c9", MAC:"d2:59:63:56:13:4e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:29.646664 env[1555]: 2025-05-10 00:45:29.639 [INFO][4028] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b" Namespace="calico-system" Pod="csi-node-driver-2gfcq" WorkloadEndpoint="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:29.691743 env[1555]: time="2025-05-10T00:45:29.691636834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:29.691965 env[1555]: time="2025-05-10T00:45:29.691934524Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:29.692120 env[1555]: time="2025-05-10T00:45:29.692072108Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:29.694150 env[1555]: time="2025-05-10T00:45:29.692428412Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b pid=4076 runtime=io.containerd.runc.v2 May 10 00:45:29.773019 systemd[1]: Started cri-containerd-e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b.scope. May 10 00:45:29.794461 env[1555]: time="2025-05-10T00:45:29.794407874Z" level=info msg="StopPodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\"" May 10 00:45:29.798305 env[1555]: time="2025-05-10T00:45:29.797726057Z" level=info msg="StopPodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\"" May 10 00:45:29.798720 env[1555]: time="2025-05-10T00:45:29.798672917Z" level=info msg="StopPodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\"" May 10 00:45:29.799337 env[1555]: time="2025-05-10T00:45:29.799303491Z" level=info msg="StopPodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\"" May 10 00:45:29.956184 kernel: audit: type=1400 audit(1746837929.945:1032): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.965269 kernel: audit: type=1400 audit(1746837929.945:1033): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.967000 audit: BPF prog-id=139 op=LOAD May 10 00:45:29.972000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4076 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356133633166343530386266613031346161663062616566626137 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4076 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356133633166343530386266613031346161663062616566626137 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.972000 audit: BPF prog-id=140 op=LOAD May 10 00:45:29.972000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000354250 items=0 ppid=4076 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356133633166343530386266613031346161663062616566626137 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit: BPF prog-id=141 op=LOAD May 10 00:45:29.973000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000354298 items=0 ppid=4076 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356133633166343530386266613031346161663062616566626137 May 10 00:45:29.973000 audit: BPF prog-id=141 op=UNLOAD May 10 00:45:29.973000 audit: BPF prog-id=140 op=UNLOAD May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:29.973000 audit: BPF prog-id=142 op=LOAD May 10 00:45:29.973000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003546a8 items=0 ppid=4076 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:29.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356133633166343530386266613031346161663062616566626137 May 10 00:45:30.063745 env[1555]: time="2025-05-10T00:45:30.063696207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2gfcq,Uid:bb27db3f-e255-4e8f-8959-a138791be4d5,Namespace:calico-system,Attempt:1,} returns sandbox id \"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b\"" May 10 00:45:30.066446 env[1555]: time="2025-05-10T00:45:30.065875171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:45:30.189416 sshd[4023]: pam_unix(sshd:session): session closed for user core May 10 00:45:30.189000 audit[4023]: USER_END pid=4023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:30.190000 audit[4023]: CRED_DISP pid=4023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:30.193031 systemd[1]: sshd@10-172.31.18.109:22-139.178.89.65:52294.service: Deactivated successfully. May 10 00:45:30.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.109:22-139.178.89.65:52294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:30.194066 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:45:30.196419 systemd-logind[1540]: Session 11 logged out. Waiting for processes to exit. May 10 00:45:30.197771 systemd-logind[1540]: Removed session 11. May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.216 [INFO][4153] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.216 [INFO][4153] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" iface="eth0" netns="/var/run/netns/cni-0cee872b-cf75-d837-fa7b-229c8d89eea8" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.216 [INFO][4153] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" iface="eth0" netns="/var/run/netns/cni-0cee872b-cf75-d837-fa7b-229c8d89eea8" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.217 [INFO][4153] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" iface="eth0" netns="/var/run/netns/cni-0cee872b-cf75-d837-fa7b-229c8d89eea8" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.217 [INFO][4153] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.217 [INFO][4153] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.296 [INFO][4207] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.297 [INFO][4207] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.298 [INFO][4207] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.306 [WARNING][4207] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.306 [INFO][4207] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.311 [INFO][4207] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.321500 env[1555]: 2025-05-10 00:45:30.316 [INFO][4153] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:30.323187 env[1555]: time="2025-05-10T00:45:30.322329376Z" level=info msg="TearDown network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" successfully" May 10 00:45:30.323187 env[1555]: time="2025-05-10T00:45:30.322379607Z" level=info msg="StopPodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" returns successfully" May 10 00:45:30.323587 env[1555]: time="2025-05-10T00:45:30.323556054Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-2n7hz,Uid:39c8f9b3-ad10-496b-998d-2c423031e9dc,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:30.387715 systemd[1]: run-containerd-runc-k8s.io-e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b-runc.3seq0Z.mount: Deactivated successfully. May 10 00:45:30.387830 systemd[1]: run-netns-cni\x2d0cee872b\x2dcf75\x2dd837\x2dfa7b\x2d229c8d89eea8.mount: Deactivated successfully. May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.272 [INFO][4174] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.273 [INFO][4174] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" iface="eth0" netns="/var/run/netns/cni-8b6d25bf-b2df-984a-f66a-4dcc6ab71bf9" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.273 [INFO][4174] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" iface="eth0" netns="/var/run/netns/cni-8b6d25bf-b2df-984a-f66a-4dcc6ab71bf9" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.274 [INFO][4174] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" iface="eth0" netns="/var/run/netns/cni-8b6d25bf-b2df-984a-f66a-4dcc6ab71bf9" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.274 [INFO][4174] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.274 [INFO][4174] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.377 [INFO][4218] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.380 [INFO][4218] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.380 [INFO][4218] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.412 [WARNING][4218] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.412 [INFO][4218] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.414 [INFO][4218] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.420289 env[1555]: 2025-05-10 00:45:30.416 [INFO][4174] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:30.424527 systemd[1]: run-netns-cni\x2d8b6d25bf\x2db2df\x2d984a\x2df66a\x2d4dcc6ab71bf9.mount: Deactivated successfully. May 10 00:45:30.429578 env[1555]: time="2025-05-10T00:45:30.429519856Z" level=info msg="TearDown network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" successfully" May 10 00:45:30.429751 env[1555]: time="2025-05-10T00:45:30.429727097Z" level=info msg="StopPodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" returns successfully" May 10 00:45:30.437498 env[1555]: time="2025-05-10T00:45:30.437456637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rdss,Uid:bf9759ae-f374-4ba3-948b-984e26a40b4e,Namespace:kube-system,Attempt:1,}" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.260 [INFO][4169] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.261 [INFO][4169] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" iface="eth0" netns="/var/run/netns/cni-21ce34ef-0e05-2e7f-5372-f6926d0e8f6d" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.261 [INFO][4169] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" iface="eth0" netns="/var/run/netns/cni-21ce34ef-0e05-2e7f-5372-f6926d0e8f6d" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.262 [INFO][4169] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" iface="eth0" netns="/var/run/netns/cni-21ce34ef-0e05-2e7f-5372-f6926d0e8f6d" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.262 [INFO][4169] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.262 [INFO][4169] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.394 [INFO][4213] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.395 [INFO][4213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.414 [INFO][4213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.431 [WARNING][4213] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.431 [INFO][4213] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.433 [INFO][4213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.476370 env[1555]: 2025-05-10 00:45:30.474 [INFO][4169] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:30.481205 systemd[1]: run-netns-cni\x2d21ce34ef\x2d0e05\x2d2e7f\x2d5372\x2df6926d0e8f6d.mount: Deactivated successfully. May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.284 [INFO][4179] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.284 [INFO][4179] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" iface="eth0" netns="/var/run/netns/cni-1ed6b5c9-36ff-ecb8-a37d-73bd0be7a9e3" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.285 [INFO][4179] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" iface="eth0" netns="/var/run/netns/cni-1ed6b5c9-36ff-ecb8-a37d-73bd0be7a9e3" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.285 [INFO][4179] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" iface="eth0" netns="/var/run/netns/cni-1ed6b5c9-36ff-ecb8-a37d-73bd0be7a9e3" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.285 [INFO][4179] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.285 [INFO][4179] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.434 [INFO][4224] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.434 [INFO][4224] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.434 [INFO][4224] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.447 [WARNING][4224] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.447 [INFO][4224] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.453 [INFO][4224] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.484119 env[1555]: 2025-05-10 00:45:30.460 [INFO][4179] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:30.485209 env[1555]: time="2025-05-10T00:45:30.485155210Z" level=info msg="TearDown network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" successfully" May 10 00:45:30.485337 env[1555]: time="2025-05-10T00:45:30.485315514Z" level=info msg="StopPodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" returns successfully" May 10 00:45:30.485657 env[1555]: time="2025-05-10T00:45:30.485628354Z" level=info msg="TearDown network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" successfully" May 10 00:45:30.485946 env[1555]: time="2025-05-10T00:45:30.485921376Z" level=info msg="StopPodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" returns successfully" May 10 00:45:30.487394 env[1555]: time="2025-05-10T00:45:30.487367069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cb89df8f5-dqlmh,Uid:b3e5a4ee-1359-4f1e-84c5-e3c53962ca17,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:30.487951 env[1555]: time="2025-05-10T00:45:30.487607473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt2wb,Uid:0c54eec8-cab2-48da-8d47-62c559879343,Namespace:kube-system,Attempt:1,}" May 10 00:45:30.708889 (udev-worker)[4052]: Network interface NamePolicy= disabled on kernel command line. May 10 00:45:30.716022 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:30.716163 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77ff7b216bc: link becomes ready May 10 00:45:30.716496 systemd-networkd[1276]: cali77ff7b216bc: Link UP May 10 00:45:30.716734 systemd-networkd[1276]: cali77ff7b216bc: Gained carrier May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.411 [INFO][4229] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.459 [INFO][4229] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0 calico-apiserver-54f546bcdc- calico-apiserver 39c8f9b3-ad10-496b-998d-2c423031e9dc 825 0 2025-05-10 00:45:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54f546bcdc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-109 calico-apiserver-54f546bcdc-2n7hz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali77ff7b216bc [] []}} ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.459 [INFO][4229] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.628 [INFO][4250] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.645 [INFO][4250] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313590), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-109", "pod":"calico-apiserver-54f546bcdc-2n7hz", "timestamp":"2025-05-10 00:45:30.628188129 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.646 [INFO][4250] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.646 [INFO][4250] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.646 [INFO][4250] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.649 [INFO][4250] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.655 [INFO][4250] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.662 [INFO][4250] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.668 [INFO][4250] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.675 [INFO][4250] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.675 [INFO][4250] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.679 [INFO][4250] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806 May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.687 [INFO][4250] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.700 [INFO][4250] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.66/26] block=192.168.54.64/26 handle="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.700 [INFO][4250] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.66/26] handle="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" host="ip-172-31-18-109" May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.700 [INFO][4250] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.750965 env[1555]: 2025-05-10 00:45:30.700 [INFO][4250] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.66/26] IPv6=[] ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.752838 env[1555]: 2025-05-10 00:45:30.707 [INFO][4229] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"39c8f9b3-ad10-496b-998d-2c423031e9dc", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"calico-apiserver-54f546bcdc-2n7hz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali77ff7b216bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:30.752838 env[1555]: 2025-05-10 00:45:30.707 [INFO][4229] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.66/32] ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.752838 env[1555]: 2025-05-10 00:45:30.707 [INFO][4229] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali77ff7b216bc ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.752838 env[1555]: 2025-05-10 00:45:30.718 [INFO][4229] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.752838 env[1555]: 2025-05-10 00:45:30.719 [INFO][4229] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"39c8f9b3-ad10-496b-998d-2c423031e9dc", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806", Pod:"calico-apiserver-54f546bcdc-2n7hz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali77ff7b216bc", MAC:"96:4f:ba:f7:dc:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:30.752838 env[1555]: 2025-05-10 00:45:30.743 [INFO][4229] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-2n7hz" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:30.785253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic817225330f: link becomes ready May 10 00:45:30.785738 systemd-networkd[1276]: calic817225330f: Link UP May 10 00:45:30.787058 systemd-networkd[1276]: calic817225330f: Gained carrier May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.550 [INFO][4252] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.578 [INFO][4252] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0 coredns-7db6d8ff4d- kube-system bf9759ae-f374-4ba3-948b-984e26a40b4e 827 0 2025-05-10 00:44:56 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-18-109 coredns-7db6d8ff4d-4rdss eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic817225330f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.578 [INFO][4252] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.632 [INFO][4289] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" HandleID="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.649 [INFO][4289] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" HandleID="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312a40), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-18-109", "pod":"coredns-7db6d8ff4d-4rdss", "timestamp":"2025-05-10 00:45:30.632689662 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.650 [INFO][4289] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.700 [INFO][4289] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.700 [INFO][4289] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.703 [INFO][4289] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.720 [INFO][4289] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.734 [INFO][4289] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.737 [INFO][4289] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.740 [INFO][4289] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.740 [INFO][4289] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.746 [INFO][4289] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352 May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.754 [INFO][4289] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.765 [INFO][4289] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.67/26] block=192.168.54.64/26 handle="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.765 [INFO][4289] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.67/26] handle="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" host="ip-172-31-18-109" May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.765 [INFO][4289] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.823202 env[1555]: 2025-05-10 00:45:30.765 [INFO][4289] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.67/26] IPv6=[] ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" HandleID="k8s-pod-network.94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.824408 env[1555]: 2025-05-10 00:45:30.774 [INFO][4252] cni-plugin/k8s.go 386: Populated endpoint ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bf9759ae-f374-4ba3-948b-984e26a40b4e", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"coredns-7db6d8ff4d-4rdss", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic817225330f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:30.824408 env[1555]: 2025-05-10 00:45:30.775 [INFO][4252] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.67/32] ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.824408 env[1555]: 2025-05-10 00:45:30.775 [INFO][4252] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic817225330f ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.824408 env[1555]: 2025-05-10 00:45:30.785 [INFO][4252] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.824408 env[1555]: 2025-05-10 00:45:30.786 [INFO][4252] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bf9759ae-f374-4ba3-948b-984e26a40b4e", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352", Pod:"coredns-7db6d8ff4d-4rdss", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic817225330f", MAC:"06:82:6b:87:d0:fd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:30.824408 env[1555]: 2025-05-10 00:45:30.817 [INFO][4252] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352" Namespace="kube-system" Pod="coredns-7db6d8ff4d-4rdss" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:30.858348 systemd-networkd[1276]: cali556b1b911c9: Gained IPv6LL May 10 00:45:30.872335 env[1555]: time="2025-05-10T00:45:30.863035953Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:30.872335 env[1555]: time="2025-05-10T00:45:30.863138845Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:30.872335 env[1555]: time="2025-05-10T00:45:30.863155640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:30.872335 env[1555]: time="2025-05-10T00:45:30.863679489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806 pid=4336 runtime=io.containerd.runc.v2 May 10 00:45:30.927662 systemd[1]: Started cri-containerd-a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806.scope. May 10 00:45:30.928806 systemd-networkd[1276]: cali7f72ad4af89: Link UP May 10 00:45:30.940223 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f72ad4af89: link becomes ready May 10 00:45:30.940104 systemd-networkd[1276]: cali7f72ad4af89: Gained carrier May 10 00:45:30.954286 env[1555]: time="2025-05-10T00:45:30.954178457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:30.954475 env[1555]: time="2025-05-10T00:45:30.954250668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:30.954475 env[1555]: time="2025-05-10T00:45:30.954266033Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:30.954615 env[1555]: time="2025-05-10T00:45:30.954474248Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352 pid=4379 runtime=io.containerd.runc.v2 May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.662 [INFO][4268] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.680 [INFO][4268] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0 coredns-7db6d8ff4d- kube-system 0c54eec8-cab2-48da-8d47-62c559879343 826 0 2025-05-10 00:44:56 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-18-109 coredns-7db6d8ff4d-zt2wb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7f72ad4af89 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.680 [INFO][4268] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.829 [INFO][4299] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" HandleID="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.847 [INFO][4299] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" HandleID="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308b30), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-18-109", "pod":"coredns-7db6d8ff4d-zt2wb", "timestamp":"2025-05-10 00:45:30.829930147 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.847 [INFO][4299] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.847 [INFO][4299] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.847 [INFO][4299] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.850 [INFO][4299] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.856 [INFO][4299] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.872 [INFO][4299] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.878 [INFO][4299] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.881 [INFO][4299] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.881 [INFO][4299] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.885 [INFO][4299] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8 May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.895 [INFO][4299] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.907 [INFO][4299] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.68/26] block=192.168.54.64/26 handle="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.907 [INFO][4299] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.68/26] handle="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" host="ip-172-31-18-109" May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.907 [INFO][4299] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:30.962191 env[1555]: 2025-05-10 00:45:30.907 [INFO][4299] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.68/26] IPv6=[] ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" HandleID="k8s-pod-network.8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.963378 env[1555]: 2025-05-10 00:45:30.911 [INFO][4268] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0c54eec8-cab2-48da-8d47-62c559879343", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"coredns-7db6d8ff4d-zt2wb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f72ad4af89", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:30.963378 env[1555]: 2025-05-10 00:45:30.911 [INFO][4268] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.68/32] ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.963378 env[1555]: 2025-05-10 00:45:30.911 [INFO][4268] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7f72ad4af89 ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.963378 env[1555]: 2025-05-10 00:45:30.940 [INFO][4268] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:30.963378 env[1555]: 2025-05-10 00:45:30.941 [INFO][4268] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0c54eec8-cab2-48da-8d47-62c559879343", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8", Pod:"coredns-7db6d8ff4d-zt2wb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f72ad4af89", MAC:"de:a6:bb:9b:4a:45", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:30.963378 env[1555]: 2025-05-10 00:45:30.959 [INFO][4268] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8" Namespace="kube-system" Pod="coredns-7db6d8ff4d-zt2wb" WorkloadEndpoint="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:31.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.008000 audit: BPF prog-id=143 op=LOAD May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4336 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353137326231623433316464326639633435316463306235656238 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4336 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353137326231623433316464326639633435316463306235656238 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit: BPF prog-id=144 op=LOAD May 10 00:45:31.009000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003c9ce0 items=0 ppid=4336 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353137326231623433316464326639633435316463306235656238 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.009000 audit: BPF prog-id=145 op=LOAD May 10 00:45:31.009000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003c9d28 items=0 ppid=4336 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353137326231623433316464326639633435316463306235656238 May 10 00:45:31.010000 audit: BPF prog-id=145 op=UNLOAD May 10 00:45:31.010000 audit: BPF prog-id=144 op=UNLOAD May 10 00:45:31.010000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.010000 audit: BPF prog-id=146 op=LOAD May 10 00:45:31.019310 env[1555]: time="2025-05-10T00:45:31.019215010Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:31.020026 env[1555]: time="2025-05-10T00:45:31.019460252Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:31.020026 env[1555]: time="2025-05-10T00:45:31.019515277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:31.020336 env[1555]: time="2025-05-10T00:45:31.020271116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8 pid=4420 runtime=io.containerd.runc.v2 May 10 00:45:31.010000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00044e138 items=0 ppid=4336 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353137326231623433316464326639633435316463306235656238 May 10 00:45:31.026927 systemd[1]: Started cri-containerd-94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352.scope. May 10 00:45:31.038113 systemd-networkd[1276]: caliea23543404a: Link UP May 10 00:45:31.039320 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea23543404a: link becomes ready May 10 00:45:31.038590 systemd-networkd[1276]: caliea23543404a: Gained carrier May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.672 [INFO][4266] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.707 [INFO][4266] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0 calico-apiserver-cb89df8f5- calico-apiserver b3e5a4ee-1359-4f1e-84c5-e3c53962ca17 828 0 2025-05-10 00:45:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:cb89df8f5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-109 calico-apiserver-cb89df8f5-dqlmh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliea23543404a [] []}} ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.707 [INFO][4266] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.874 [INFO][4308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" HandleID="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.889 [INFO][4308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" HandleID="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038f680), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-109", "pod":"calico-apiserver-cb89df8f5-dqlmh", "timestamp":"2025-05-10 00:45:30.874035851 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.889 [INFO][4308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.908 [INFO][4308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.908 [INFO][4308] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.917 [INFO][4308] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.931 [INFO][4308] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.961 [INFO][4308] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.969 [INFO][4308] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.977 [INFO][4308] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.977 [INFO][4308] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.984 [INFO][4308] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:30.998 [INFO][4308] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:31.013 [INFO][4308] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.69/26] block=192.168.54.64/26 handle="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:31.013 [INFO][4308] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.69/26] handle="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" host="ip-172-31-18-109" May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:31.013 [INFO][4308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:31.068972 env[1555]: 2025-05-10 00:45:31.013 [INFO][4308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.69/26] IPv6=[] ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" HandleID="k8s-pod-network.a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.071249 env[1555]: 2025-05-10 00:45:31.023 [INFO][4266] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0", GenerateName:"calico-apiserver-cb89df8f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cb89df8f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"calico-apiserver-cb89df8f5-dqlmh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea23543404a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:31.071249 env[1555]: 2025-05-10 00:45:31.023 [INFO][4266] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.69/32] ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.071249 env[1555]: 2025-05-10 00:45:31.023 [INFO][4266] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliea23543404a ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.071249 env[1555]: 2025-05-10 00:45:31.039 [INFO][4266] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.071249 env[1555]: 2025-05-10 00:45:31.039 [INFO][4266] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0", GenerateName:"calico-apiserver-cb89df8f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cb89df8f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c", Pod:"calico-apiserver-cb89df8f5-dqlmh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea23543404a", MAC:"c6:8f:d8:fe:cc:60", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:31.071249 env[1555]: 2025-05-10 00:45:31.066 [INFO][4266] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c" Namespace="calico-apiserver" Pod="calico-apiserver-cb89df8f5-dqlmh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:31.091736 systemd[1]: Started cri-containerd-8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8.scope. May 10 00:45:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.095000 audit: BPF prog-id=147 op=LOAD May 10 00:45:31.095000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.095000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4379 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934363730633836343865363332396334663966663932396637333136 May 10 00:45:31.095000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.095000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4379 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934363730633836343865363332396334663966663932396637333136 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit: BPF prog-id=148 op=LOAD May 10 00:45:31.096000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002209b0 items=0 ppid=4379 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934363730633836343865363332396334663966663932396637333136 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit: BPF prog-id=149 op=LOAD May 10 00:45:31.096000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002209f8 items=0 ppid=4379 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934363730633836343865363332396334663966663932396637333136 May 10 00:45:31.096000 audit: BPF prog-id=149 op=UNLOAD May 10 00:45:31.096000 audit: BPF prog-id=148 op=UNLOAD May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.096000 audit: BPF prog-id=150 op=LOAD May 10 00:45:31.096000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000220e08 items=0 ppid=4379 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934363730633836343865363332396334663966663932396637333136 May 10 00:45:31.122107 env[1555]: time="2025-05-10T00:45:31.122019730Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:31.122262 env[1555]: time="2025-05-10T00:45:31.122129657Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:31.122262 env[1555]: time="2025-05-10T00:45:31.122161426Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:31.122438 env[1555]: time="2025-05-10T00:45:31.122398675Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c pid=4473 runtime=io.containerd.runc.v2 May 10 00:45:31.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.154000 audit: BPF prog-id=151 op=LOAD May 10 00:45:31.158000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.158000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4420 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363064323938313762393433373737646166613266333038313065 May 10 00:45:31.158000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.158000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4420 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363064323938313762393433373737646166613266333038313065 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit: BPF prog-id=152 op=LOAD May 10 00:45:31.159000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000213440 items=0 ppid=4420 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363064323938313762393433373737646166613266333038313065 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit: BPF prog-id=153 op=LOAD May 10 00:45:31.159000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000213488 items=0 ppid=4420 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363064323938313762393433373737646166613266333038313065 May 10 00:45:31.159000 audit: BPF prog-id=153 op=UNLOAD May 10 00:45:31.159000 audit: BPF prog-id=152 op=UNLOAD May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.159000 audit: BPF prog-id=154 op=LOAD May 10 00:45:31.159000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213898 items=0 ppid=4420 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862363064323938313762393433373737646166613266333038313065 May 10 00:45:31.173992 systemd[1]: Started cri-containerd-a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c.scope. May 10 00:45:31.185472 env[1555]: time="2025-05-10T00:45:31.185411367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-2n7hz,Uid:39c8f9b3-ad10-496b-998d-2c423031e9dc,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\"" May 10 00:45:31.221681 env[1555]: time="2025-05-10T00:45:31.214379080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-4rdss,Uid:bf9759ae-f374-4ba3-948b-984e26a40b4e,Namespace:kube-system,Attempt:1,} returns sandbox id \"94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352\"" May 10 00:45:31.227735 env[1555]: time="2025-05-10T00:45:31.227685168Z" level=info msg="CreateContainer within sandbox \"94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:45:31.237191 env[1555]: time="2025-05-10T00:45:31.237133608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-zt2wb,Uid:0c54eec8-cab2-48da-8d47-62c559879343,Namespace:kube-system,Attempt:1,} returns sandbox id \"8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8\"" May 10 00:45:31.244287 env[1555]: time="2025-05-10T00:45:31.244242166Z" level=info msg="CreateContainer within sandbox \"8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:45:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.256000 audit: BPF prog-id=155 op=LOAD May 10 00:45:31.257000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.257000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136366432343239383438306331316330373661643135613638636331 May 10 00:45:31.257000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.257000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136366432343239383438306331316330373661643135613638636331 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit: BPF prog-id=156 op=LOAD May 10 00:45:31.258000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020b8b0 items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136366432343239383438306331316330373661643135613638636331 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit: BPF prog-id=157 op=LOAD May 10 00:45:31.258000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020b8f8 items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136366432343239383438306331316330373661643135613638636331 May 10 00:45:31.258000 audit: BPF prog-id=157 op=UNLOAD May 10 00:45:31.258000 audit: BPF prog-id=156 op=UNLOAD May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { perfmon } for pid=4482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit[4482]: AVC avc: denied { bpf } for pid=4482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.258000 audit: BPF prog-id=158 op=LOAD May 10 00:45:31.258000 audit[4482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020bd08 items=0 ppid=4473 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136366432343239383438306331316330373661643135613638636331 May 10 00:45:31.265966 env[1555]: time="2025-05-10T00:45:31.265909150Z" level=info msg="CreateContainer within sandbox \"94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ab3cf54760438bf5b98c9ff8c4ac8e2348be00469aeb10387fb8fb91287cdf53\"" May 10 00:45:31.268488 env[1555]: time="2025-05-10T00:45:31.268450795Z" level=info msg="StartContainer for \"ab3cf54760438bf5b98c9ff8c4ac8e2348be00469aeb10387fb8fb91287cdf53\"" May 10 00:45:31.274389 env[1555]: time="2025-05-10T00:45:31.274339473Z" level=info msg="CreateContainer within sandbox \"8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e696649a8c0cc099ae92fd40c62a21cff524f1bafb61de4ea8d081b02c9d0d0c\"" May 10 00:45:31.275128 env[1555]: time="2025-05-10T00:45:31.275073139Z" level=info msg="StartContainer for \"e696649a8c0cc099ae92fd40c62a21cff524f1bafb61de4ea8d081b02c9d0d0c\"" May 10 00:45:31.309434 systemd[1]: Started cri-containerd-ab3cf54760438bf5b98c9ff8c4ac8e2348be00469aeb10387fb8fb91287cdf53.scope. May 10 00:45:31.335011 systemd[1]: Started cri-containerd-e696649a8c0cc099ae92fd40c62a21cff524f1bafb61de4ea8d081b02c9d0d0c.scope. May 10 00:45:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.380000 audit: BPF prog-id=159 op=LOAD May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4420 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393636343961386330636330393961653932666434306336326132 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4420 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393636343961386330636330393961653932666434306336326132 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit: BPF prog-id=160 op=LOAD May 10 00:45:31.387000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000299420 items=0 ppid=4420 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393636343961386330636330393961653932666434306336326132 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.387000 audit: BPF prog-id=161 op=LOAD May 10 00:45:31.387000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000299468 items=0 ppid=4420 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393636343961386330636330393961653932666434306336326132 May 10 00:45:31.388000 audit: BPF prog-id=161 op=UNLOAD May 10 00:45:31.388000 audit: BPF prog-id=160 op=UNLOAD May 10 00:45:31.388000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.388000 audit: BPF prog-id=162 op=LOAD May 10 00:45:31.388000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000299878 items=0 ppid=4420 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536393636343961386330636330393961653932666434306336326132 May 10 00:45:31.401031 systemd[1]: run-netns-cni\x2d1ed6b5c9\x2d36ff\x2decb8\x2da37d\x2d73bd0be7a9e3.mount: Deactivated successfully. May 10 00:45:31.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.418000 audit: BPF prog-id=163 op=LOAD May 10 00:45:31.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4379 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336366353437363034333862663562393863396666386334616338 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4379 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336366353437363034333862663562393863396666386334616338 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.420000 audit: BPF prog-id=164 op=LOAD May 10 00:45:31.420000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021b340 items=0 ppid=4379 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336366353437363034333862663562393863396666386334616338 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.422000 audit: BPF prog-id=165 op=LOAD May 10 00:45:31.422000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021b388 items=0 ppid=4379 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336366353437363034333862663562393863396666386334616338 May 10 00:45:31.423000 audit: BPF prog-id=165 op=UNLOAD May 10 00:45:31.423000 audit: BPF prog-id=164 op=UNLOAD May 10 00:45:31.423000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { perfmon } for pid=4529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit[4529]: AVC avc: denied { bpf } for pid=4529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.423000 audit: BPF prog-id=166 op=LOAD May 10 00:45:31.423000 audit[4529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021b798 items=0 ppid=4379 pid=4529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162336366353437363034333862663562393863396666386334616338 May 10 00:45:31.460143 env[1555]: time="2025-05-10T00:45:31.460049393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cb89df8f5-dqlmh,Uid:b3e5a4ee-1359-4f1e-84c5-e3c53962ca17,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c\"" May 10 00:45:31.481138 env[1555]: time="2025-05-10T00:45:31.476568800Z" level=info msg="StartContainer for \"ab3cf54760438bf5b98c9ff8c4ac8e2348be00469aeb10387fb8fb91287cdf53\" returns successfully" May 10 00:45:31.485263 env[1555]: time="2025-05-10T00:45:31.485219388Z" level=info msg="StartContainer for \"e696649a8c0cc099ae92fd40c62a21cff524f1bafb61de4ea8d081b02c9d0d0c\" returns successfully" May 10 00:45:31.703778 env[1555]: time="2025-05-10T00:45:31.703730691Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.708202 env[1555]: time="2025-05-10T00:45:31.708154717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.711786 env[1555]: time="2025-05-10T00:45:31.711749399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.714746 env[1555]: time="2025-05-10T00:45:31.714711874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.715475 env[1555]: time="2025-05-10T00:45:31.715449452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:45:31.717286 env[1555]: time="2025-05-10T00:45:31.717264647Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:31.719547 env[1555]: time="2025-05-10T00:45:31.719524352Z" level=info msg="CreateContainer within sandbox \"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:45:31.739622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1156219038.mount: Deactivated successfully. May 10 00:45:31.748763 env[1555]: time="2025-05-10T00:45:31.748718741Z" level=info msg="CreateContainer within sandbox \"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2522d4d62d1db22e1f24bcdca4fd2e8f19c62294a81be249ce0f75c25ef37b83\"" May 10 00:45:31.749592 env[1555]: time="2025-05-10T00:45:31.749560101Z" level=info msg="StartContainer for \"2522d4d62d1db22e1f24bcdca4fd2e8f19c62294a81be249ce0f75c25ef37b83\"" May 10 00:45:31.780244 systemd[1]: Started cri-containerd-2522d4d62d1db22e1f24bcdca4fd2e8f19c62294a81be249ce0f75c25ef37b83.scope. May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f55d0f18008 items=0 ppid=4076 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235323264346436326431646232326531663234626364636134666432 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit: BPF prog-id=167 op=LOAD May 10 00:45:31.832000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00033e258 items=0 ppid=4076 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235323264346436326431646232326531663234626364636134666432 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit: BPF prog-id=168 op=LOAD May 10 00:45:31.832000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00033e2a8 items=0 ppid=4076 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235323264346436326431646232326531663234626364636134666432 May 10 00:45:31.832000 audit: BPF prog-id=168 op=UNLOAD May 10 00:45:31.832000 audit: BPF prog-id=167 op=UNLOAD May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { perfmon } for pid=4617 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit[4617]: AVC avc: denied { bpf } for pid=4617 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.832000 audit: BPF prog-id=169 op=LOAD May 10 00:45:31.832000 audit[4617]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00033e338 items=0 ppid=4076 pid=4617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235323264346436326431646232326531663234626364636134666432 May 10 00:45:31.855332 env[1555]: time="2025-05-10T00:45:31.855270919Z" level=info msg="StartContainer for \"2522d4d62d1db22e1f24bcdca4fd2e8f19c62294a81be249ce0f75c25ef37b83\" returns successfully" May 10 00:45:32.104621 kubelet[2527]: I0510 00:45:32.104476 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-zt2wb" podStartSLOduration=36.104444152 podStartE2EDuration="36.104444152s" podCreationTimestamp="2025-05-10 00:44:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:32.089143344 +0000 UTC m=+48.437863522" watchObservedRunningTime="2025-05-10 00:45:32.104444152 +0000 UTC m=+48.453164334" May 10 00:45:32.138259 systemd-networkd[1276]: calic817225330f: Gained IPv6LL May 10 00:45:32.140282 systemd-networkd[1276]: cali77ff7b216bc: Gained IPv6LL May 10 00:45:32.196000 audit[4657]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:32.196000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe321aac70 a2=0 a3=7ffe321aac5c items=0 ppid=2758 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:32.200000 audit[4657]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=4657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:32.200000 audit[4657]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe321aac70 a2=0 a3=0 items=0 ppid=2758 pid=4657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:32.213000 audit[4660]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=4660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:32.213000 audit[4660]: SYSCALL arch=c000003e syscall=46 success=yes exit=4420 a0=3 a1=7ffe5a42c6a0 a2=0 a3=7ffe5a42c68c items=0 ppid=2758 pid=4660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.213000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:32.233000 audit[4660]: NETFILTER_CFG table=nat:98 family=2 entries=45 op=nft_register_chain pid=4660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:32.233000 audit[4660]: SYSCALL arch=c000003e syscall=46 success=yes exit=19092 a0=3 a1=7ffe5a42c6a0 a2=0 a3=7ffe5a42c68c items=0 ppid=2758 pid=4660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:32.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:32.267560 systemd-networkd[1276]: cali7f72ad4af89: Gained IPv6LL May 10 00:45:32.385590 systemd[1]: run-containerd-runc-k8s.io-2522d4d62d1db22e1f24bcdca4fd2e8f19c62294a81be249ce0f75c25ef37b83-runc.mRu4T9.mount: Deactivated successfully. May 10 00:45:32.392893 kubelet[2527]: I0510 00:45:32.392850 2527 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:32.444977 kubelet[2527]: I0510 00:45:32.444919 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-4rdss" podStartSLOduration=36.444890896 podStartE2EDuration="36.444890896s" podCreationTimestamp="2025-05-10 00:44:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:32.122003198 +0000 UTC m=+48.470723372" watchObservedRunningTime="2025-05-10 00:45:32.444890896 +0000 UTC m=+48.793611073" May 10 00:45:32.586621 systemd-networkd[1276]: caliea23543404a: Gained IPv6LL May 10 00:45:32.789575 env[1555]: time="2025-05-10T00:45:32.789530290Z" level=info msg="StopPodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\"" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.854 [INFO][4709] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.854 [INFO][4709] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" iface="eth0" netns="/var/run/netns/cni-9ba17063-4ca0-ce88-c493-09deffec3aba" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.855 [INFO][4709] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" iface="eth0" netns="/var/run/netns/cni-9ba17063-4ca0-ce88-c493-09deffec3aba" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.855 [INFO][4709] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" iface="eth0" netns="/var/run/netns/cni-9ba17063-4ca0-ce88-c493-09deffec3aba" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.855 [INFO][4709] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.855 [INFO][4709] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.899 [INFO][4716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.900 [INFO][4716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.901 [INFO][4716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.914 [WARNING][4716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.914 [INFO][4716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.950 [INFO][4716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:32.962447 env[1555]: 2025-05-10 00:45:32.952 [INFO][4709] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:32.971890 env[1555]: time="2025-05-10T00:45:32.963290376Z" level=info msg="TearDown network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" successfully" May 10 00:45:32.971890 env[1555]: time="2025-05-10T00:45:32.963349182Z" level=info msg="StopPodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" returns successfully" May 10 00:45:32.971890 env[1555]: time="2025-05-10T00:45:32.964418061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-w8b2z,Uid:79ddf9c0-41ca-4fb7-aa65-dc07e519acd4,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:32.966778 systemd[1]: run-netns-cni\x2d9ba17063\x2d4ca0\x2dce88\x2dc493\x2d09deffec3aba.mount: Deactivated successfully. May 10 00:45:33.145000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.145000 audit: BPF prog-id=170 op=LOAD May 10 00:45:33.145000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee01bca40 a2=98 a3=3 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.145000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.146000 audit: BPF prog-id=170 op=UNLOAD May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit: BPF prog-id=171 op=LOAD May 10 00:45:33.152000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee01bc820 a2=74 a3=540051 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.152000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.152000 audit: BPF prog-id=171 op=UNLOAD May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.152000 audit: BPF prog-id=172 op=LOAD May 10 00:45:33.152000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee01bc850 a2=94 a3=2 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.152000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.152000 audit: BPF prog-id=172 op=UNLOAD May 10 00:45:33.273000 audit[4760]: NETFILTER_CFG table=filter:99 family=2 entries=11 op=nft_register_rule pid=4760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:33.273000 audit[4760]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd64b82a60 a2=0 a3=7ffd64b82a4c items=0 ppid=2758 pid=4760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:33.283000 audit[4760]: NETFILTER_CFG table=nat:100 family=2 entries=25 op=nft_register_chain pid=4760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:33.283000 audit[4760]: SYSCALL arch=c000003e syscall=46 success=yes exit=8580 a0=3 a1=7ffd64b82a60 a2=0 a3=7ffd64b82a4c items=0 ppid=2758 pid=4760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:33.315074 systemd-networkd[1276]: cali8b65e917725: Link UP May 10 00:45:33.319157 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:33.319376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8b65e917725: link becomes ready May 10 00:45:33.319558 systemd-networkd[1276]: cali8b65e917725: Gained carrier May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.123 [INFO][4728] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0 calico-apiserver-54f546bcdc- calico-apiserver 79ddf9c0-41ca-4fb7-aa65-dc07e519acd4 881 0 2025-05-10 00:45:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54f546bcdc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-109 calico-apiserver-54f546bcdc-w8b2z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8b65e917725 [] []}} ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.124 [INFO][4728] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.223 [INFO][4748] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.236 [INFO][4748] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003089d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-109", "pod":"calico-apiserver-54f546bcdc-w8b2z", "timestamp":"2025-05-10 00:45:33.222997773 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.236 [INFO][4748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.236 [INFO][4748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.236 [INFO][4748] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.244 [INFO][4748] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.253 [INFO][4748] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.258 [INFO][4748] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.261 [INFO][4748] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.266 [INFO][4748] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.266 [INFO][4748] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.272 [INFO][4748] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.286 [INFO][4748] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.302 [INFO][4748] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.70/26] block=192.168.54.64/26 handle="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.302 [INFO][4748] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.70/26] handle="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" host="ip-172-31-18-109" May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.302 [INFO][4748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:33.372171 env[1555]: 2025-05-10 00:45:33.302 [INFO][4748] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.70/26] IPv6=[] ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.373990 env[1555]: 2025-05-10 00:45:33.307 [INFO][4728] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"calico-apiserver-54f546bcdc-w8b2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b65e917725", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:33.373990 env[1555]: 2025-05-10 00:45:33.308 [INFO][4728] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.70/32] ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.373990 env[1555]: 2025-05-10 00:45:33.308 [INFO][4728] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8b65e917725 ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.373990 env[1555]: 2025-05-10 00:45:33.323 [INFO][4728] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.373990 env[1555]: 2025-05-10 00:45:33.323 [INFO][4728] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d", Pod:"calico-apiserver-54f546bcdc-w8b2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b65e917725", MAC:"a2:65:b9:75:6b:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:33.373990 env[1555]: 2025-05-10 00:45:33.369 [INFO][4728] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Namespace="calico-apiserver" Pod="calico-apiserver-54f546bcdc-w8b2z" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:33.424443 env[1555]: time="2025-05-10T00:45:33.423509267Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:33.424443 env[1555]: time="2025-05-10T00:45:33.423593401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:33.424443 env[1555]: time="2025-05-10T00:45:33.423625082Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:33.424443 env[1555]: time="2025-05-10T00:45:33.423870253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d pid=4783 runtime=io.containerd.runc.v2 May 10 00:45:33.491397 systemd[1]: Started cri-containerd-d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d.scope. May 10 00:45:33.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.542000 audit: BPF prog-id=173 op=LOAD May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4783 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663839653861623636323836613537646432313737643038343264 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4783 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663839653861623636323836613537646432313737643038343264 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit: BPF prog-id=174 op=LOAD May 10 00:45:33.543000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002f0320 items=0 ppid=4783 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663839653861623636323836613537646432313737643038343264 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit: BPF prog-id=175 op=LOAD May 10 00:45:33.543000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002f0368 items=0 ppid=4783 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663839653861623636323836613537646432313737643038343264 May 10 00:45:33.543000 audit: BPF prog-id=175 op=UNLOAD May 10 00:45:33.543000 audit: BPF prog-id=174 op=UNLOAD May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { perfmon } for pid=4792 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit[4792]: AVC avc: denied { bpf } for pid=4792 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.543000 audit: BPF prog-id=176 op=LOAD May 10 00:45:33.543000 audit[4792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002f0778 items=0 ppid=4783 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663839653861623636323836613537646432313737643038343264 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit: BPF prog-id=177 op=LOAD May 10 00:45:33.607000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee01bc710 a2=40 a3=1 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.607000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.607000 audit: BPF prog-id=177 op=UNLOAD May 10 00:45:33.607000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.607000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee01bc7e0 a2=50 a3=7ffee01bc8c0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.607000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.628201 env[1555]: time="2025-05-10T00:45:33.628151481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54f546bcdc-w8b2z,Uid:79ddf9c0-41ca-4fb7-aa65-dc07e519acd4,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\"" May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee01bc720 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee01bc750 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee01bc660 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee01bc770 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee01bc750 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee01bc740 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee01bc770 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee01bc750 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee01bc770 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee01bc740 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.639000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.639000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee01bc7b0 a2=28 a3=0 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.639000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee01bc560 a2=50 a3=1 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit: BPF prog-id=178 op=LOAD May 10 00:45:33.640000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee01bc560 a2=94 a3=5 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.640000 audit: BPF prog-id=178 op=UNLOAD May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee01bc610 a2=50 a3=1 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee01bc730 a2=4 a3=38 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.640000 audit[4756]: AVC avc: denied { confidentiality } for pid=4756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:33.640000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee01bc780 a2=94 a3=6 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.640000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { confidentiality } for pid=4756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:33.641000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee01bbf30 a2=94 a3=83 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.641000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { perfmon } for pid=4756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { bpf } for pid=4756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.641000 audit[4756]: AVC avc: denied { confidentiality } for pid=4756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:33.641000 audit[4756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee01bbf30 a2=94 a3=83 items=0 ppid=4722 pid=4756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.641000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:33.732000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.732000 audit: BPF prog-id=179 op=LOAD May 10 00:45:33.732000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffaf28ed90 a2=98 a3=1999999999999999 items=0 ppid=4722 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.732000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:33.733000 audit: BPF prog-id=179 op=UNLOAD May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit: BPF prog-id=180 op=LOAD May 10 00:45:33.733000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffaf28ec70 a2=74 a3=ffff items=0 ppid=4722 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.733000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:33.733000 audit: BPF prog-id=180 op=UNLOAD May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { perfmon } for pid=4822 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit[4822]: AVC avc: denied { bpf } for pid=4822 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.733000 audit: BPF prog-id=181 op=LOAD May 10 00:45:33.733000 audit[4822]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffaf28ecb0 a2=40 a3=7fffaf28ee90 items=0 ppid=4722 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.733000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:33.733000 audit: BPF prog-id=181 op=UNLOAD May 10 00:45:33.791729 env[1555]: time="2025-05-10T00:45:33.791689117Z" level=info msg="StopPodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\"" May 10 00:45:33.907194 systemd-networkd[1276]: vxlan.calico: Link UP May 10 00:45:33.907204 systemd-networkd[1276]: vxlan.calico: Gained carrier May 10 00:45:33.998000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.998000 audit: BPF prog-id=182 op=LOAD May 10 00:45:33.998000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd7fc1e20 a2=98 a3=ffffffff items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.998000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.998000 audit: BPF prog-id=182 op=UNLOAD May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit: BPF prog-id=183 op=LOAD May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd7fc1c30 a2=74 a3=540051 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit: BPF prog-id=183 op=UNLOAD May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit: BPF prog-id=184 op=LOAD May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd7fc1c60 a2=94 a3=2 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit: BPF prog-id=184 op=UNLOAD May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd7fc1b30 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7fc1b60 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7fc1a70 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd7fc1b80 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd7fc1b60 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd7fc1b50 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd7fc1b80 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7fc1b60 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7fc1b80 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd7fc1b50 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd7fc1bc0 a2=28 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:33.999000 audit: BPF prog-id=185 op=LOAD May 10 00:45:33.999000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd7fc1a30 a2=40 a3=0 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:33.999000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:33.999000 audit: BPF prog-id=185 op=UNLOAD May 10 00:45:34.000000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.000000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcd7fc1a20 a2=50 a3=2800 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:34.011000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.011000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcd7fc1a20 a2=50 a3=2800 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.011000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit: BPF prog-id=186 op=LOAD May 10 00:45:34.016000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd7fc1240 a2=94 a3=2 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:34.016000 audit: BPF prog-id=186 op=UNLOAD May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.016000 audit: BPF prog-id=187 op=LOAD May 10 00:45:34.016000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd7fc1340 a2=94 a3=30 items=0 ppid=4722 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit: BPF prog-id=188 op=LOAD May 10 00:45:34.026000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5d4014a0 a2=98 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.026000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.026000 audit: BPF prog-id=188 op=UNLOAD May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit: BPF prog-id=189 op=LOAD May 10 00:45:34.026000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5d401280 a2=74 a3=540051 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.026000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.026000 audit: BPF prog-id=189 op=UNLOAD May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.026000 audit: BPF prog-id=190 op=LOAD May 10 00:45:34.026000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5d4012b0 a2=94 a3=2 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.026000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.026000 audit: BPF prog-id=190 op=UNLOAD May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:33.968 [INFO][4849] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:33.968 [INFO][4849] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" iface="eth0" netns="/var/run/netns/cni-0b4c75f2-abc6-6117-45a4-61a996921067" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:33.969 [INFO][4849] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" iface="eth0" netns="/var/run/netns/cni-0b4c75f2-abc6-6117-45a4-61a996921067" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:33.969 [INFO][4849] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" iface="eth0" netns="/var/run/netns/cni-0b4c75f2-abc6-6117-45a4-61a996921067" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:33.969 [INFO][4849] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:33.969 [INFO][4849] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.084 [INFO][4870] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.085 [INFO][4870] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.085 [INFO][4870] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.098 [WARNING][4870] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.098 [INFO][4870] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.104 [INFO][4870] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:34.111912 env[1555]: 2025-05-10 00:45:34.108 [INFO][4849] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:34.123205 env[1555]: time="2025-05-10T00:45:34.112163011Z" level=info msg="TearDown network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" successfully" May 10 00:45:34.123205 env[1555]: time="2025-05-10T00:45:34.112203687Z" level=info msg="StopPodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" returns successfully" May 10 00:45:34.123205 env[1555]: time="2025-05-10T00:45:34.115837764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bf69bcdf-7tmvh,Uid:a391f88f-8f1f-414e-8d1f-6cd0df0cb271,Namespace:calico-system,Attempt:1,}" May 10 00:45:34.119424 systemd[1]: run-netns-cni\x2d0b4c75f2\x2dabc6\x2d6117\x2d45a4\x2d61a996921067.mount: Deactivated successfully. May 10 00:45:34.365000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.368755 kernel: kauditd_printk_skb: 863 callbacks suppressed May 10 00:45:34.368852 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.373387 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.384602 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.384680 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.397778 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.397876 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.410281 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.410374 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416105 kernel: audit: type=1400 audit(1746837934.365:1255): avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.365000 audit: BPF prog-id=191 op=LOAD May 10 00:45:34.365000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5d401170 a2=40 a3=1 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.365000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.374000 audit: BPF prog-id=191 op=UNLOAD May 10 00:45:34.374000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.374000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5d401240 a2=50 a3=7fff5d401320 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.374000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5d401180 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.423537 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5d4011b0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5d4010c0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5d4011d0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5d4011b0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5d4011a0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.415000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.415000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5d4011d0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.415000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5d4011b0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5d4011d0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5d4011a0 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5d401210 a2=28 a3=0 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5d400fc0 a2=50 a3=1 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.416000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5d400fc0 a2=94 a3=5 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.416000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.420000 audit: BPF prog-id=192 op=UNLOAD May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5d401070 a2=50 a3=1 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff5d401190 a2=4 a3=38 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { confidentiality } for pid=4880 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:34.420000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5d4011e0 a2=94 a3=6 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { confidentiality } for pid=4880 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:34.420000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5d400990 a2=94 a3=83 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { perfmon } for pid=4880 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.420000 audit[4880]: AVC avc: denied { confidentiality } for pid=4880 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:34.420000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5d400990 a2=94 a3=83 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.420000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.421000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.421000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff5d4023d0 a2=10 a3=f1f00800 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.421000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.421000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.421000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff5d402270 a2=10 a3=3 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.421000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.421000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.421000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff5d402210 a2=10 a3=3 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.421000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.421000 audit[4880]: AVC avc: denied { bpf } for pid=4880 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.421000 audit[4880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff5d402210 a2=10 a3=7 items=0 ppid=4722 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.421000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:34.432000 audit: BPF prog-id=187 op=UNLOAD May 10 00:45:34.490490 systemd-networkd[1276]: cali23729e803ee: Link UP May 10 00:45:34.494166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali23729e803ee: link becomes ready May 10 00:45:34.493615 systemd-networkd[1276]: cali23729e803ee: Gained carrier May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.269 [INFO][4885] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0 calico-kube-controllers-86bf69bcdf- calico-system a391f88f-8f1f-414e-8d1f-6cd0df0cb271 891 0 2025-05-10 00:45:05 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:86bf69bcdf projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-18-109 calico-kube-controllers-86bf69bcdf-7tmvh eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali23729e803ee [] []}} ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.271 [INFO][4885] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.357 [INFO][4898] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.400 [INFO][4898] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031afd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-18-109", "pod":"calico-kube-controllers-86bf69bcdf-7tmvh", "timestamp":"2025-05-10 00:45:34.357270919 +0000 UTC"}, Hostname:"ip-172-31-18-109", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.400 [INFO][4898] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.400 [INFO][4898] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.400 [INFO][4898] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-109' May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.410 [INFO][4898] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.432 [INFO][4898] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.440 [INFO][4898] ipam/ipam.go 489: Trying affinity for 192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.449 [INFO][4898] ipam/ipam.go 155: Attempting to load block cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.454 [INFO][4898] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.54.64/26 host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.454 [INFO][4898] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.54.64/26 handle="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.457 [INFO][4898] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394 May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.468 [INFO][4898] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.54.64/26 handle="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.481 [INFO][4898] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.54.71/26] block=192.168.54.64/26 handle="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.481 [INFO][4898] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.54.71/26] handle="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" host="ip-172-31-18-109" May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.481 [INFO][4898] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:34.520257 env[1555]: 2025-05-10 00:45:34.481 [INFO][4898] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.54.71/26] IPv6=[] ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.522089 env[1555]: 2025-05-10 00:45:34.486 [INFO][4885] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0", GenerateName:"calico-kube-controllers-86bf69bcdf-", Namespace:"calico-system", SelfLink:"", UID:"a391f88f-8f1f-414e-8d1f-6cd0df0cb271", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bf69bcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"", Pod:"calico-kube-controllers-86bf69bcdf-7tmvh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali23729e803ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:34.522089 env[1555]: 2025-05-10 00:45:34.486 [INFO][4885] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.54.71/32] ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.522089 env[1555]: 2025-05-10 00:45:34.486 [INFO][4885] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali23729e803ee ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.522089 env[1555]: 2025-05-10 00:45:34.496 [INFO][4885] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.522089 env[1555]: 2025-05-10 00:45:34.498 [INFO][4885] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0", GenerateName:"calico-kube-controllers-86bf69bcdf-", Namespace:"calico-system", SelfLink:"", UID:"a391f88f-8f1f-414e-8d1f-6cd0df0cb271", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bf69bcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394", Pod:"calico-kube-controllers-86bf69bcdf-7tmvh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali23729e803ee", MAC:"aa:17:0d:90:3b:bb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:34.522089 env[1555]: 2025-05-10 00:45:34.515 [INFO][4885] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Namespace="calico-system" Pod="calico-kube-controllers-86bf69bcdf-7tmvh" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:34.567867 env[1555]: time="2025-05-10T00:45:34.567774636Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:34.568101 env[1555]: time="2025-05-10T00:45:34.567850648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:34.568101 env[1555]: time="2025-05-10T00:45:34.567866429Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:34.568249 env[1555]: time="2025-05-10T00:45:34.568153970Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394 pid=4937 runtime=io.containerd.runc.v2 May 10 00:45:34.608452 systemd[1]: run-containerd-runc-k8s.io-4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394-runc.5qsa7m.mount: Deactivated successfully. May 10 00:45:34.615259 systemd[1]: Started cri-containerd-4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394.scope. May 10 00:45:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.645000 audit: BPF prog-id=193 op=LOAD May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4937 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333163623731373738663965393137363035633563363238306232 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4937 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333163623731373738663965393137363035633563363238306232 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit: BPF prog-id=194 op=LOAD May 10 00:45:34.652000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024870 items=0 ppid=4937 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333163623731373738663965393137363035633563363238306232 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit: BPF prog-id=195 op=LOAD May 10 00:45:34.652000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000248b8 items=0 ppid=4937 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333163623731373738663965393137363035633563363238306232 May 10 00:45:34.652000 audit: BPF prog-id=195 op=UNLOAD May 10 00:45:34.652000 audit: BPF prog-id=194 op=UNLOAD May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { perfmon } for pid=4947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit[4947]: AVC avc: denied { bpf } for pid=4947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:34.652000 audit: BPF prog-id=196 op=LOAD May 10 00:45:34.652000 audit[4947]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024cc8 items=0 ppid=4937 pid=4947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333163623731373738663965393137363035633563363238306232 May 10 00:45:34.724099 env[1555]: time="2025-05-10T00:45:34.719559609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-86bf69bcdf-7tmvh,Uid:a391f88f-8f1f-414e-8d1f-6cd0df0cb271,Namespace:calico-system,Attempt:1,} returns sandbox id \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\"" May 10 00:45:34.750000 audit[4984]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4984 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:34.750000 audit[4984]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc0ef98100 a2=0 a3=7ffc0ef980ec items=0 ppid=4722 pid=4984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:34.785000 audit[4983]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:34.785000 audit[4983]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdad7e3690 a2=0 a3=7ffdad7e367c items=0 ppid=4722 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.785000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:34.800000 audit[4985]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=4985 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:34.800000 audit[4985]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff04c0a590 a2=0 a3=7fff04c0a57c items=0 ppid=4722 pid=4985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.800000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:34.810000 audit[4986]: NETFILTER_CFG table=filter:104 family=2 entries=215 op=nft_register_chain pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:34.810000 audit[4986]: SYSCALL arch=c000003e syscall=46 success=yes exit=127460 a0=3 a1=7ffda5db24a0 a2=0 a3=7ffda5db248c items=0 ppid=4722 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.810000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:34.865000 audit[4993]: NETFILTER_CFG table=filter:105 family=2 entries=50 op=nft_register_chain pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:34.865000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=23376 a0=3 a1=7ffd53fd5060 a2=0 a3=7ffd53fd504c items=0 ppid=4722 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:34.865000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:35.212281 systemd-networkd[1276]: vxlan.calico: Gained IPv6LL May 10 00:45:35.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.18.109:22-139.178.89.65:52298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:35.215788 systemd[1]: Started sshd@11-172.31.18.109:22-139.178.89.65:52298.service. May 10 00:45:35.339214 systemd-networkd[1276]: cali8b65e917725: Gained IPv6LL May 10 00:45:35.431000 audit[5007]: USER_ACCT pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:35.434063 sshd[5007]: Accepted publickey for core from 139.178.89.65 port 52298 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:35.433000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:35.434000 audit[5007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc41f3b40 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:35.444725 sshd[5007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:35.456766 systemd[1]: Started session-12.scope. May 10 00:45:35.458140 systemd-logind[1540]: New session 12 of user core. May 10 00:45:35.465000 audit[5007]: USER_START pid=5007 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:35.468000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:35.573811 systemd[1]: run-containerd-runc-k8s.io-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d-runc.roYUyI.mount: Deactivated successfully. May 10 00:45:35.600941 env[1555]: time="2025-05-10T00:45:35.600884318Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:35.605860 env[1555]: time="2025-05-10T00:45:35.605813083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:35.609236 env[1555]: time="2025-05-10T00:45:35.609194164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:35.613323 env[1555]: time="2025-05-10T00:45:35.613281693Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:35.614063 env[1555]: time="2025-05-10T00:45:35.614015712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:35.620074 env[1555]: time="2025-05-10T00:45:35.619998358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:35.624362 env[1555]: time="2025-05-10T00:45:35.624319911Z" level=info msg="CreateContainer within sandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:35.661064 env[1555]: time="2025-05-10T00:45:35.661012560Z" level=info msg="CreateContainer within sandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\"" May 10 00:45:35.661860 env[1555]: time="2025-05-10T00:45:35.661834660Z" level=info msg="StartContainer for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\"" May 10 00:45:35.693052 systemd[1]: Started cri-containerd-14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91.scope. May 10 00:45:35.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.737000 audit: BPF prog-id=197 op=LOAD May 10 00:45:35.739000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.739000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4336 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616231656134366537356439653835326132663434323463373263 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4336 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616231656134366537356439653835326132663434323463373263 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit: BPF prog-id=198 op=LOAD May 10 00:45:35.740000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000349cf0 items=0 ppid=4336 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616231656134366537356439653835326132663434323463373263 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit: BPF prog-id=199 op=LOAD May 10 00:45:35.740000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000349d38 items=0 ppid=4336 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616231656134366537356439653835326132663434323463373263 May 10 00:45:35.740000 audit: BPF prog-id=199 op=UNLOAD May 10 00:45:35.740000 audit: BPF prog-id=198 op=UNLOAD May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:35.740000 audit: BPF prog-id=200 op=LOAD May 10 00:45:35.740000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b8148 items=0 ppid=4336 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134616231656134366537356439653835326132663434323463373263 May 10 00:45:35.786522 systemd-networkd[1276]: cali23729e803ee: Gained IPv6LL May 10 00:45:35.801997 env[1555]: time="2025-05-10T00:45:35.801926349Z" level=info msg="StartContainer for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" returns successfully" May 10 00:45:36.007358 env[1555]: time="2025-05-10T00:45:36.007230986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:36.011678 env[1555]: time="2025-05-10T00:45:36.011633374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:36.015728 env[1555]: time="2025-05-10T00:45:36.015466454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:36.018531 env[1555]: time="2025-05-10T00:45:36.018307625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:36.018679 env[1555]: time="2025-05-10T00:45:36.018604898Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:36.022212 env[1555]: time="2025-05-10T00:45:36.021183498Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:45:36.023869 env[1555]: time="2025-05-10T00:45:36.023361010Z" level=info msg="CreateContainer within sandbox \"a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:36.049973 env[1555]: time="2025-05-10T00:45:36.049919735Z" level=info msg="CreateContainer within sandbox \"a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"96e94ef377ed739abc6c3ca1236bf713b81f449178057b7a5d81816326eaf8a0\"" May 10 00:45:36.052374 env[1555]: time="2025-05-10T00:45:36.050926356Z" level=info msg="StartContainer for \"96e94ef377ed739abc6c3ca1236bf713b81f449178057b7a5d81816326eaf8a0\"" May 10 00:45:36.097008 systemd[1]: Started cri-containerd-96e94ef377ed739abc6c3ca1236bf713b81f449178057b7a5d81816326eaf8a0.scope. May 10 00:45:36.167031 kubelet[2527]: I0510 00:45:36.166683 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54f546bcdc-2n7hz" podStartSLOduration=27.734351572 podStartE2EDuration="32.166658849s" podCreationTimestamp="2025-05-10 00:45:04 +0000 UTC" firstStartedPulling="2025-05-10 00:45:31.187177879 +0000 UTC m=+47.535898050" lastFinishedPulling="2025-05-10 00:45:35.619485155 +0000 UTC m=+51.968205327" observedRunningTime="2025-05-10 00:45:36.162353791 +0000 UTC m=+52.511073970" watchObservedRunningTime="2025-05-10 00:45:36.166658849 +0000 UTC m=+52.515379028" May 10 00:45:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.224000 audit: BPF prog-id=201 op=LOAD May 10 00:45:36.225000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.225000 audit[5075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4473 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653934656633373765643733396162633663336361313233366266 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4473 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653934656633373765643733396162633663336361313233366266 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.226000 audit: BPF prog-id=202 op=LOAD May 10 00:45:36.226000 audit[5075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00022b1f0 items=0 ppid=4473 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653934656633373765643733396162633663336361313233366266 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.230000 audit: BPF prog-id=203 op=LOAD May 10 00:45:36.230000 audit[5075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00022b238 items=0 ppid=4473 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653934656633373765643733396162633663336361313233366266 May 10 00:45:36.233000 audit: BPF prog-id=203 op=UNLOAD May 10 00:45:36.233000 audit: BPF prog-id=202 op=UNLOAD May 10 00:45:36.233000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { perfmon } for pid=5075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit[5075]: AVC avc: denied { bpf } for pid=5075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:36.233000 audit: BPF prog-id=204 op=LOAD May 10 00:45:36.233000 audit[5075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00022b648 items=0 ppid=4473 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936653934656633373765643733396162633663336361313233366266 May 10 00:45:36.246000 audit[5093]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=5093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:36.246000 audit[5093]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc5e5bad60 a2=0 a3=7ffc5e5bad4c items=0 ppid=2758 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:36.259000 audit[5093]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=5093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:36.259000 audit[5093]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc5e5bad60 a2=0 a3=7ffc5e5bad4c items=0 ppid=2758 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:36.291216 env[1555]: time="2025-05-10T00:45:36.291164083Z" level=info msg="StartContainer for \"96e94ef377ed739abc6c3ca1236bf713b81f449178057b7a5d81816326eaf8a0\" returns successfully" May 10 00:45:36.294850 sshd[5007]: pam_unix(sshd:session): session closed for user core May 10 00:45:36.295000 audit[5007]: USER_END pid=5007 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.295000 audit[5007]: CRED_DISP pid=5007 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.298622 systemd-logind[1540]: Session 12 logged out. Waiting for processes to exit. May 10 00:45:36.299072 systemd[1]: sshd@11-172.31.18.109:22-139.178.89.65:52298.service: Deactivated successfully. May 10 00:45:36.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.18.109:22-139.178.89.65:52298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.300127 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:45:36.301803 systemd-logind[1540]: Removed session 12. May 10 00:45:36.321650 systemd[1]: Started sshd@12-172.31.18.109:22-139.178.89.65:52306.service. May 10 00:45:36.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.109:22-139.178.89.65:52306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.500702 sshd[5106]: Accepted publickey for core from 139.178.89.65 port 52306 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:36.498000 audit[5106]: USER_ACCT pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.500000 audit[5106]: CRED_ACQ pid=5106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.500000 audit[5106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff65080490 a2=3 a3=0 items=0 ppid=1 pid=5106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:36.500000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:36.502616 sshd[5106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:36.512352 systemd[1]: Started session-13.scope. May 10 00:45:36.514633 systemd-logind[1540]: New session 13 of user core. May 10 00:45:36.520000 audit[5106]: USER_START pid=5106 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.522000 audit[5112]: CRED_ACQ pid=5112 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.575156 systemd[1]: run-containerd-runc-k8s.io-14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91-runc.8CRT6d.mount: Deactivated successfully. May 10 00:45:36.909934 sshd[5106]: pam_unix(sshd:session): session closed for user core May 10 00:45:36.910000 audit[5106]: USER_END pid=5106 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.911000 audit[5106]: CRED_DISP pid=5106 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:36.914959 systemd-logind[1540]: Session 13 logged out. Waiting for processes to exit. May 10 00:45:36.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.109:22-139.178.89.65:52306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:36.917366 systemd[1]: sshd@12-172.31.18.109:22-139.178.89.65:52306.service: Deactivated successfully. May 10 00:45:36.918463 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:45:36.920786 systemd-logind[1540]: Removed session 13. May 10 00:45:36.935799 systemd[1]: Started sshd@13-172.31.18.109:22-139.178.89.65:37846.service. May 10 00:45:36.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.109:22-139.178.89.65:37846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:37.128388 sshd[5122]: Accepted publickey for core from 139.178.89.65 port 37846 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:37.128777 kubelet[2527]: I0510 00:45:37.128367 2527 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:37.127000 audit[5122]: USER_ACCT pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:37.129000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:37.129000 audit[5122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5189e170 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.129000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:37.132311 sshd[5122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:37.140228 systemd[1]: Started session-14.scope. May 10 00:45:37.144886 systemd-logind[1540]: New session 14 of user core. May 10 00:45:37.152000 audit[5122]: USER_START pid=5122 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:37.154000 audit[5124]: CRED_ACQ pid=5124 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:37.201000 audit[5127]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=5127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.201000 audit[5127]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdbc5984a0 a2=0 a3=7ffdbc59848c items=0 ppid=2758 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.206000 audit[5127]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=5127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:37.206000 audit[5127]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdbc5984a0 a2=0 a3=7ffdbc59848c items=0 ppid=2758 pid=5127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:37.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:37.495769 sshd[5122]: pam_unix(sshd:session): session closed for user core May 10 00:45:37.497000 audit[5122]: USER_END pid=5122 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:37.497000 audit[5122]: CRED_DISP pid=5122 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:37.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.109:22-139.178.89.65:37846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:37.507496 systemd[1]: sshd@13-172.31.18.109:22-139.178.89.65:37846.service: Deactivated successfully. May 10 00:45:37.509622 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:45:37.510571 systemd-logind[1540]: Session 14 logged out. Waiting for processes to exit. May 10 00:45:37.512789 systemd-logind[1540]: Removed session 14. May 10 00:45:38.043000 audit[5049]: AVC avc: denied { watch } for pid=5049 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_16.2175718450/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c160,c593 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c160,c593 tclass=file permissive=0 May 10 00:45:38.043000 audit[5049]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010dd840 a2=fc6 a3=0 items=0 ppid=4336 pid=5049 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c160,c593 key=(null) May 10 00:45:38.043000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:38.130241 kubelet[2527]: I0510 00:45:38.130211 2527 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:38.157717 env[1555]: time="2025-05-10T00:45:38.157671420Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.161344 env[1555]: time="2025-05-10T00:45:38.161300250Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.164367 env[1555]: time="2025-05-10T00:45:38.164319918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.171438 env[1555]: time="2025-05-10T00:45:38.171192283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.171673 env[1555]: time="2025-05-10T00:45:38.171608364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:45:38.173712 env[1555]: time="2025-05-10T00:45:38.173671768Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:38.192501 env[1555]: time="2025-05-10T00:45:38.192407431Z" level=info msg="CreateContainer within sandbox \"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:45:38.212358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2318884507.mount: Deactivated successfully. May 10 00:45:38.216370 env[1555]: time="2025-05-10T00:45:38.216309047Z" level=info msg="CreateContainer within sandbox \"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3ff678efeade570f8dbf19f7807ffae345dd4adf641ca954b67daa1dd0ac031a\"" May 10 00:45:38.218734 env[1555]: time="2025-05-10T00:45:38.217229759Z" level=info msg="StartContainer for \"3ff678efeade570f8dbf19f7807ffae345dd4adf641ca954b67daa1dd0ac031a\"" May 10 00:45:38.259746 systemd[1]: run-containerd-runc-k8s.io-3ff678efeade570f8dbf19f7807ffae345dd4adf641ca954b67daa1dd0ac031a-runc.ivaVRd.mount: Deactivated successfully. May 10 00:45:38.265980 systemd[1]: Started cri-containerd-3ff678efeade570f8dbf19f7807ffae345dd4adf641ca954b67daa1dd0ac031a.scope. May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f95f8307dc8 items=0 ppid=4076 pid=5142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366663637386566656164653537306638646266313966373830376666 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit: BPF prog-id=205 op=LOAD May 10 00:45:38.294000 audit[5142]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00026deb8 items=0 ppid=4076 pid=5142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366663637386566656164653537306638646266313966373830376666 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit: BPF prog-id=206 op=LOAD May 10 00:45:38.294000 audit[5142]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00026df08 items=0 ppid=4076 pid=5142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366663637386566656164653537306638646266313966373830376666 May 10 00:45:38.294000 audit: BPF prog-id=206 op=UNLOAD May 10 00:45:38.294000 audit: BPF prog-id=205 op=UNLOAD May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { perfmon } for pid=5142 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit[5142]: AVC avc: denied { bpf } for pid=5142 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.294000 audit: BPF prog-id=207 op=LOAD May 10 00:45:38.294000 audit[5142]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00026df98 items=0 ppid=4076 pid=5142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366663637386566656164653537306638646266313966373830376666 May 10 00:45:38.322337 env[1555]: time="2025-05-10T00:45:38.322285573Z" level=info msg="StartContainer for \"3ff678efeade570f8dbf19f7807ffae345dd4adf641ca954b67daa1dd0ac031a\" returns successfully" May 10 00:45:38.550000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.550000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00169c150 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:45:38.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.556000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:38.556000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000939e20 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:45:38.556000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:38.591135 env[1555]: time="2025-05-10T00:45:38.591091558Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.595028 env[1555]: time="2025-05-10T00:45:38.594959740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.593000 audit[5087]: AVC avc: denied { watch } for pid=5087 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_16.3311537486/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c415,c621 tclass=file permissive=0 May 10 00:45:38.593000 audit[5087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004a2220 a2=fc6 a3=0 items=0 ppid=4473 pid=5087 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 key=(null) May 10 00:45:38.593000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:38.598268 env[1555]: time="2025-05-10T00:45:38.598233217Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.601991 env[1555]: time="2025-05-10T00:45:38.601954561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:38.603769 env[1555]: time="2025-05-10T00:45:38.603053507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:38.605520 env[1555]: time="2025-05-10T00:45:38.605474887Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:45:38.622403 env[1555]: time="2025-05-10T00:45:38.621601632Z" level=info msg="CreateContainer within sandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:38.642975 env[1555]: time="2025-05-10T00:45:38.642902863Z" level=info msg="CreateContainer within sandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\"" May 10 00:45:38.645161 env[1555]: time="2025-05-10T00:45:38.643749840Z" level=info msg="StartContainer for \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\"" May 10 00:45:38.667441 systemd[1]: Started cri-containerd-b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8.scope. May 10 00:45:38.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.694000 audit: BPF prog-id=208 op=LOAD May 10 00:45:38.696000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4783 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666662616339643163303331333565613165323566386333346661 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4783 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666662616339643163303331333565613165323566386333346661 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.696000 audit: BPF prog-id=209 op=LOAD May 10 00:45:38.696000 audit[5183]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001459d8 a2=78 a3=c000025210 items=0 ppid=4783 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666662616339643163303331333565613165323566386333346661 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit: BPF prog-id=210 op=LOAD May 10 00:45:38.697000 audit[5183]: SYSCALL arch=c000003e syscall=321 success=yes exit=19 a0=5 a1=c000145770 a2=78 a3=c000025258 items=0 ppid=4783 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666662616339643163303331333565613165323566386333346661 May 10 00:45:38.697000 audit: BPF prog-id=210 op=UNLOAD May 10 00:45:38.697000 audit: BPF prog-id=209 op=UNLOAD May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { perfmon } for pid=5183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit[5183]: AVC avc: denied { bpf } for pid=5183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:38.697000 audit: BPF prog-id=211 op=LOAD May 10 00:45:38.697000 audit[5183]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145c30 a2=78 a3=c000025668 items=0 ppid=4783 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:38.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666662616339643163303331333565613165323566386333346661 May 10 00:45:38.737518 env[1555]: time="2025-05-10T00:45:38.737467041Z" level=info msg="StartContainer for \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\" returns successfully" May 10 00:45:39.155945 kubelet[2527]: I0510 00:45:39.155877 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-cb89df8f5-dqlmh" podStartSLOduration=29.5971697 podStartE2EDuration="34.155852154s" podCreationTimestamp="2025-05-10 00:45:05 +0000 UTC" firstStartedPulling="2025-05-10 00:45:31.461584492 +0000 UTC m=+47.810304666" lastFinishedPulling="2025-05-10 00:45:36.020266948 +0000 UTC m=+52.368987120" observedRunningTime="2025-05-10 00:45:37.177695961 +0000 UTC m=+53.526416140" watchObservedRunningTime="2025-05-10 00:45:39.155852154 +0000 UTC m=+55.504572334" May 10 00:45:39.167426 kubelet[2527]: I0510 00:45:39.152494 2527 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:45:39.179262 kubelet[2527]: I0510 00:45:39.179224 2527 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:45:39.202847 kubelet[2527]: I0510 00:45:39.202784 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2gfcq" podStartSLOduration=27.095064971 podStartE2EDuration="35.20275954s" podCreationTimestamp="2025-05-10 00:45:04 +0000 UTC" firstStartedPulling="2025-05-10 00:45:30.065367948 +0000 UTC m=+46.414088113" lastFinishedPulling="2025-05-10 00:45:38.173062503 +0000 UTC m=+54.521782682" observedRunningTime="2025-05-10 00:45:39.202010879 +0000 UTC m=+55.550731065" watchObservedRunningTime="2025-05-10 00:45:39.20275954 +0000 UTC m=+55.551479719" May 10 00:45:39.203235 kubelet[2527]: I0510 00:45:39.203191 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54f546bcdc-w8b2z" podStartSLOduration=30.228332636 podStartE2EDuration="35.203175389s" podCreationTimestamp="2025-05-10 00:45:04 +0000 UTC" firstStartedPulling="2025-05-10 00:45:33.630116406 +0000 UTC m=+49.978836569" lastFinishedPulling="2025-05-10 00:45:38.604959152 +0000 UTC m=+54.953679322" observedRunningTime="2025-05-10 00:45:39.157067192 +0000 UTC m=+55.505787372" watchObservedRunningTime="2025-05-10 00:45:39.203175389 +0000 UTC m=+55.551895588" May 10 00:45:39.242000 audit[5214]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=5214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:39.242000 audit[5214]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd0aa86b90 a2=0 a3=7ffd0aa86b7c items=0 ppid=2758 pid=5214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:39.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:39.256000 audit[5214]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=5214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:39.256000 audit[5214]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd0aa86b90 a2=0 a3=7ffd0aa86b7c items=0 ppid=2758 pid=5214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:39.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:39.645000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.648536 kernel: kauditd_printk_skb: 464 callbacks suppressed May 10 00:45:39.648667 kernel: audit: type=1400 audit(1746837939.645:1402): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.646000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.656540 kernel: audit: type=1400 audit(1746837939.646:1403): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.646000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a502180 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.662000 kernel: audit: type=1300 audit(1746837939.646:1403): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a502180 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.662167 kernel: audit: type=1327 audit(1746837939.646:1403): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.646000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.645000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a62cd00 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.671565 kernel: audit: type=1300 audit(1746837939.645:1402): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a62cd00 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.671696 kernel: audit: type=1327 audit(1746837939.645:1402): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.645000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.647000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.680136 kernel: audit: type=1400 audit(1746837939.647:1404): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.680236 kernel: audit: type=1300 audit(1746837939.647:1404): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a5e3d40 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.647000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a5e3d40 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.699797 kernel: audit: type=1327 audit(1746837939.647:1404): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.647000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.655000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.712316 kernel: audit: type=1400 audit(1746837939.655:1405): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.655000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a5e3dd0 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.655000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.730000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.730000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a502330 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.730000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.730000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:39.730000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a85fb20 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:45:39.730000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:45:39.772000 audit[5194]: AVC avc: denied { watch } for pid=5194 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_16.2425993930/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c307,c645 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c307,c645 tclass=file permissive=0 May 10 00:45:39.772000 audit[5194]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bc8d40 a2=fc6 a3=0 items=0 ppid=4783 pid=5194 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c307,c645 key=(null) May 10 00:45:39.772000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:39.852000 audit[5222]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=5222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:39.852000 audit[5222]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc7c6dffc0 a2=0 a3=7ffc7c6dffac items=0 ppid=2758 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:39.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:39.858000 audit[5222]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=5222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:39.858000 audit[5222]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7c6dffc0 a2=0 a3=7ffc7c6dffac items=0 ppid=2758 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:39.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:41.610117 env[1555]: time="2025-05-10T00:45:41.610055111Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.612661 env[1555]: time="2025-05-10T00:45:41.612613824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.614163 env[1555]: time="2025-05-10T00:45:41.614125593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.615804 env[1555]: time="2025-05-10T00:45:41.615760774Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.616770 env[1555]: time="2025-05-10T00:45:41.616721298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:45:41.706358 env[1555]: time="2025-05-10T00:45:41.706315996Z" level=info msg="CreateContainer within sandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:45:41.729554 env[1555]: time="2025-05-10T00:45:41.729474069Z" level=info msg="CreateContainer within sandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\"" May 10 00:45:41.731786 env[1555]: time="2025-05-10T00:45:41.730658324Z" level=info msg="StartContainer for \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\"" May 10 00:45:41.732302 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1234008846.mount: Deactivated successfully. May 10 00:45:41.761149 systemd[1]: Started cri-containerd-bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d.scope. May 10 00:45:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.785000 audit: BPF prog-id=212 op=LOAD May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4937 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646435656665393661373166666134623039316230383763636164 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4937 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646435656665393661373166666134623039316230383763636164 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit: BPF prog-id=213 op=LOAD May 10 00:45:41.786000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00034ebf0 items=0 ppid=4937 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646435656665393661373166666134623039316230383763636164 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit: BPF prog-id=214 op=LOAD May 10 00:45:41.786000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00034ec38 items=0 ppid=4937 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646435656665393661373166666134623039316230383763636164 May 10 00:45:41.786000 audit: BPF prog-id=214 op=UNLOAD May 10 00:45:41.786000 audit: BPF prog-id=213 op=UNLOAD May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { perfmon } for pid=5235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit[5235]: AVC avc: denied { bpf } for pid=5235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.786000 audit: BPF prog-id=215 op=LOAD May 10 00:45:41.786000 audit[5235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00034f048 items=0 ppid=4937 pid=5235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266646435656665393661373166666134623039316230383763636164 May 10 00:45:41.829059 env[1555]: time="2025-05-10T00:45:41.829009187Z" level=info msg="StartContainer for \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\" returns successfully" May 10 00:45:42.166260 kubelet[2527]: I0510 00:45:42.166191 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-86bf69bcdf-7tmvh" podStartSLOduration=30.268935462 podStartE2EDuration="37.166169339s" podCreationTimestamp="2025-05-10 00:45:05 +0000 UTC" firstStartedPulling="2025-05-10 00:45:34.721006887 +0000 UTC m=+51.069727049" lastFinishedPulling="2025-05-10 00:45:41.61824075 +0000 UTC m=+57.966960926" observedRunningTime="2025-05-10 00:45:42.165649526 +0000 UTC m=+58.514369698" watchObservedRunningTime="2025-05-10 00:45:42.166169339 +0000 UTC m=+58.514889511" May 10 00:45:42.522024 systemd[1]: Started sshd@14-172.31.18.109:22-139.178.89.65:37848.service. May 10 00:45:42.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.109:22-139.178.89.65:37848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:42.737000 audit[5288]: USER_ACCT pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:42.741347 sshd[5288]: Accepted publickey for core from 139.178.89.65 port 37848 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:42.740000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:42.740000 audit[5288]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff234f6dd0 a2=3 a3=0 items=0 ppid=1 pid=5288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:42.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:42.744047 sshd[5288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:42.754774 systemd[1]: Started session-15.scope. May 10 00:45:42.755138 systemd-logind[1540]: New session 15 of user core. May 10 00:45:42.760000 audit[5288]: USER_START pid=5288 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:42.761000 audit[5291]: CRED_ACQ pid=5291 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:43.530685 sshd[5288]: pam_unix(sshd:session): session closed for user core May 10 00:45:43.531000 audit[5288]: USER_END pid=5288 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:43.531000 audit[5288]: CRED_DISP pid=5288 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:43.534331 systemd[1]: sshd@14-172.31.18.109:22-139.178.89.65:37848.service: Deactivated successfully. May 10 00:45:43.535126 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:45:43.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.109:22-139.178.89.65:37848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:43.535600 systemd-logind[1540]: Session 15 logged out. Waiting for processes to exit. May 10 00:45:43.536913 systemd-logind[1540]: Removed session 15. May 10 00:45:44.160627 env[1555]: time="2025-05-10T00:45:44.160008348Z" level=info msg="StopPodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\"" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:44.746 [WARNING][5319] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"39c8f9b3-ad10-496b-998d-2c423031e9dc", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806", Pod:"calico-apiserver-54f546bcdc-2n7hz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali77ff7b216bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:44.756 [INFO][5319] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:44.756 [INFO][5319] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" iface="eth0" netns="" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:44.756 [INFO][5319] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:44.756 [INFO][5319] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.167 [INFO][5327] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.173 [INFO][5327] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.175 [INFO][5327] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.201 [WARNING][5327] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.201 [INFO][5327] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.204 [INFO][5327] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.208112 env[1555]: 2025-05-10 00:45:45.206 [INFO][5319] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.210995 env[1555]: time="2025-05-10T00:45:45.208137345Z" level=info msg="TearDown network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" successfully" May 10 00:45:45.210995 env[1555]: time="2025-05-10T00:45:45.208166428Z" level=info msg="StopPodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" returns successfully" May 10 00:45:45.233461 env[1555]: time="2025-05-10T00:45:45.233417405Z" level=info msg="RemovePodSandbox for \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\"" May 10 00:45:45.233624 env[1555]: time="2025-05-10T00:45:45.233461103Z" level=info msg="Forcibly stopping sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\"" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.283 [WARNING][5352] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"39c8f9b3-ad10-496b-998d-2c423031e9dc", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806", Pod:"calico-apiserver-54f546bcdc-2n7hz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali77ff7b216bc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.283 [INFO][5352] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.283 [INFO][5352] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" iface="eth0" netns="" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.283 [INFO][5352] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.283 [INFO][5352] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.309 [INFO][5360] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.309 [INFO][5360] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.309 [INFO][5360] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.318 [WARNING][5360] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.318 [INFO][5360] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" HandleID="k8s-pod-network.b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.321 [INFO][5360] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.330030 env[1555]: 2025-05-10 00:45:45.326 [INFO][5352] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348" May 10 00:45:45.334774 env[1555]: time="2025-05-10T00:45:45.330070629Z" level=info msg="TearDown network for sandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" successfully" May 10 00:45:45.337568 env[1555]: time="2025-05-10T00:45:45.337513245Z" level=info msg="RemovePodSandbox \"b521b429f5a77bec8fc63e79baefee2834f2eabb88e5733118ded09715f30348\" returns successfully" May 10 00:45:45.340168 env[1555]: time="2025-05-10T00:45:45.340131499Z" level=info msg="StopPodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\"" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.385 [WARNING][5379] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0", GenerateName:"calico-apiserver-cb89df8f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cb89df8f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c", Pod:"calico-apiserver-cb89df8f5-dqlmh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea23543404a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.386 [INFO][5379] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.386 [INFO][5379] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" iface="eth0" netns="" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.386 [INFO][5379] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.386 [INFO][5379] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.410 [INFO][5386] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.410 [INFO][5386] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.410 [INFO][5386] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.417 [WARNING][5386] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.417 [INFO][5386] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.419 [INFO][5386] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.424128 env[1555]: 2025-05-10 00:45:45.421 [INFO][5379] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.427214 env[1555]: time="2025-05-10T00:45:45.424570391Z" level=info msg="TearDown network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" successfully" May 10 00:45:45.427214 env[1555]: time="2025-05-10T00:45:45.424614341Z" level=info msg="StopPodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" returns successfully" May 10 00:45:45.427214 env[1555]: time="2025-05-10T00:45:45.425140596Z" level=info msg="RemovePodSandbox for \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\"" May 10 00:45:45.427214 env[1555]: time="2025-05-10T00:45:45.425200057Z" level=info msg="Forcibly stopping sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\"" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.471 [WARNING][5404] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0", GenerateName:"calico-apiserver-cb89df8f5-", Namespace:"calico-apiserver", SelfLink:"", UID:"b3e5a4ee-1359-4f1e-84c5-e3c53962ca17", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cb89df8f5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"a66d24298480c11c076ad15a68cc1b0bb8caeac7bcdc477bd293275b8401c29c", Pod:"calico-apiserver-cb89df8f5-dqlmh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea23543404a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.471 [INFO][5404] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.471 [INFO][5404] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" iface="eth0" netns="" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.471 [INFO][5404] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.471 [INFO][5404] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.505 [INFO][5411] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.505 [INFO][5411] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.506 [INFO][5411] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.511 [WARNING][5411] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.512 [INFO][5411] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" HandleID="k8s-pod-network.e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" Workload="ip--172--31--18--109-k8s-calico--apiserver--cb89df8f5--dqlmh-eth0" May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.513 [INFO][5411] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.517849 env[1555]: 2025-05-10 00:45:45.515 [INFO][5404] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa" May 10 00:45:45.518403 env[1555]: time="2025-05-10T00:45:45.518374726Z" level=info msg="TearDown network for sandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" successfully" May 10 00:45:45.522318 env[1555]: time="2025-05-10T00:45:45.522261009Z" level=info msg="RemovePodSandbox \"e2b3656445b4da2293a164aaccb44273f95725c3843c5f630eb9072d8c0444fa\" returns successfully" May 10 00:45:45.539316 env[1555]: time="2025-05-10T00:45:45.539280399Z" level=info msg="StopPodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\"" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.584 [WARNING][5430] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bf9759ae-f374-4ba3-948b-984e26a40b4e", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352", Pod:"coredns-7db6d8ff4d-4rdss", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic817225330f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.584 [INFO][5430] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.584 [INFO][5430] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" iface="eth0" netns="" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.584 [INFO][5430] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.584 [INFO][5430] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.609 [INFO][5437] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.609 [INFO][5437] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.609 [INFO][5437] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.616 [WARNING][5437] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.616 [INFO][5437] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.622 [INFO][5437] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.626298 env[1555]: 2025-05-10 00:45:45.624 [INFO][5430] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.630443 env[1555]: time="2025-05-10T00:45:45.626334268Z" level=info msg="TearDown network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" successfully" May 10 00:45:45.630443 env[1555]: time="2025-05-10T00:45:45.626369070Z" level=info msg="StopPodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" returns successfully" May 10 00:45:45.630443 env[1555]: time="2025-05-10T00:45:45.627059360Z" level=info msg="RemovePodSandbox for \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\"" May 10 00:45:45.630443 env[1555]: time="2025-05-10T00:45:45.627116067Z" level=info msg="Forcibly stopping sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\"" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.669 [WARNING][5456] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bf9759ae-f374-4ba3-948b-984e26a40b4e", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"94670c8648e6329c4f9ff929f7316a02664562f62d70d3cb466d2aaef3a2d352", Pod:"coredns-7db6d8ff4d-4rdss", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic817225330f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.669 [INFO][5456] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.669 [INFO][5456] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" iface="eth0" netns="" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.669 [INFO][5456] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.669 [INFO][5456] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.694 [INFO][5464] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.694 [INFO][5464] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.694 [INFO][5464] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.700 [WARNING][5464] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.701 [INFO][5464] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" HandleID="k8s-pod-network.e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--4rdss-eth0" May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.702 [INFO][5464] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.707060 env[1555]: 2025-05-10 00:45:45.705 [INFO][5456] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529" May 10 00:45:45.708896 env[1555]: time="2025-05-10T00:45:45.707124804Z" level=info msg="TearDown network for sandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" successfully" May 10 00:45:45.711718 env[1555]: time="2025-05-10T00:45:45.711668566Z" level=info msg="RemovePodSandbox \"e7a47097395a0932c47be70434fd1a5db109e69d21eb8eefe6c2c31d4fb6a529\" returns successfully" May 10 00:45:45.712347 env[1555]: time="2025-05-10T00:45:45.712311928Z" level=info msg="StopPodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\"" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.756 [WARNING][5483] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0c54eec8-cab2-48da-8d47-62c559879343", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8", Pod:"coredns-7db6d8ff4d-zt2wb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f72ad4af89", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.756 [INFO][5483] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.756 [INFO][5483] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" iface="eth0" netns="" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.756 [INFO][5483] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.756 [INFO][5483] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.785 [INFO][5490] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.785 [INFO][5490] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.785 [INFO][5490] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.792 [WARNING][5490] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.792 [INFO][5490] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.797 [INFO][5490] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.805013 env[1555]: 2025-05-10 00:45:45.802 [INFO][5483] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.805013 env[1555]: time="2025-05-10T00:45:45.804911912Z" level=info msg="TearDown network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" successfully" May 10 00:45:45.805013 env[1555]: time="2025-05-10T00:45:45.804947002Z" level=info msg="StopPodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" returns successfully" May 10 00:45:45.808619 env[1555]: time="2025-05-10T00:45:45.806621094Z" level=info msg="RemovePodSandbox for \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\"" May 10 00:45:45.808619 env[1555]: time="2025-05-10T00:45:45.806653866Z" level=info msg="Forcibly stopping sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\"" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.849 [WARNING][5508] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"0c54eec8-cab2-48da-8d47-62c559879343", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 44, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"8b60d29817b943777dafa2f30810e6999d23f47b783f0631f28340c6356d0ff8", Pod:"coredns-7db6d8ff4d-zt2wb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.54.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f72ad4af89", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.849 [INFO][5508] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.849 [INFO][5508] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" iface="eth0" netns="" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.849 [INFO][5508] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.849 [INFO][5508] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.874 [INFO][5515] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.874 [INFO][5515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.874 [INFO][5515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.882 [WARNING][5515] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.882 [INFO][5515] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" HandleID="k8s-pod-network.78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" Workload="ip--172--31--18--109-k8s-coredns--7db6d8ff4d--zt2wb-eth0" May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.884 [INFO][5515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.888607 env[1555]: 2025-05-10 00:45:45.886 [INFO][5508] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a" May 10 00:45:45.889349 env[1555]: time="2025-05-10T00:45:45.888667983Z" level=info msg="TearDown network for sandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" successfully" May 10 00:45:45.893706 env[1555]: time="2025-05-10T00:45:45.893661694Z" level=info msg="RemovePodSandbox \"78cde5ceeed8136a6002be1af788e4b4843984fd609368a57102884b6445406a\" returns successfully" May 10 00:45:45.894537 env[1555]: time="2025-05-10T00:45:45.894409445Z" level=info msg="StopPodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\"" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.939 [WARNING][5533] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0", GenerateName:"calico-kube-controllers-86bf69bcdf-", Namespace:"calico-system", SelfLink:"", UID:"a391f88f-8f1f-414e-8d1f-6cd0df0cb271", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bf69bcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394", Pod:"calico-kube-controllers-86bf69bcdf-7tmvh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali23729e803ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.940 [INFO][5533] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.940 [INFO][5533] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" iface="eth0" netns="" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.940 [INFO][5533] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.940 [INFO][5533] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.972 [INFO][5540] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.973 [INFO][5540] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.973 [INFO][5540] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.980 [WARNING][5540] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.980 [INFO][5540] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.985 [INFO][5540] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:45.991544 env[1555]: 2025-05-10 00:45:45.989 [INFO][5533] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:45.993574 env[1555]: time="2025-05-10T00:45:45.991574808Z" level=info msg="TearDown network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" successfully" May 10 00:45:45.993574 env[1555]: time="2025-05-10T00:45:45.991610426Z" level=info msg="StopPodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" returns successfully" May 10 00:45:45.993574 env[1555]: time="2025-05-10T00:45:45.993127358Z" level=info msg="RemovePodSandbox for \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\"" May 10 00:45:45.993574 env[1555]: time="2025-05-10T00:45:45.993186735Z" level=info msg="Forcibly stopping sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\"" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.051 [WARNING][5559] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0", GenerateName:"calico-kube-controllers-86bf69bcdf-", Namespace:"calico-system", SelfLink:"", UID:"a391f88f-8f1f-414e-8d1f-6cd0df0cb271", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"86bf69bcdf", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394", Pod:"calico-kube-controllers-86bf69bcdf-7tmvh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.54.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali23729e803ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.051 [INFO][5559] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.051 [INFO][5559] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" iface="eth0" netns="" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.051 [INFO][5559] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.051 [INFO][5559] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.076 [INFO][5566] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.077 [INFO][5566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.077 [INFO][5566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.084 [WARNING][5566] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.084 [INFO][5566] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" HandleID="k8s-pod-network.5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.086 [INFO][5566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.091410 env[1555]: 2025-05-10 00:45:46.089 [INFO][5559] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89" May 10 00:45:46.093769 env[1555]: time="2025-05-10T00:45:46.092634990Z" level=info msg="TearDown network for sandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" successfully" May 10 00:45:46.098460 env[1555]: time="2025-05-10T00:45:46.098417919Z" level=info msg="RemovePodSandbox \"5a5c4ce769dddff0c99df910731e2e229b3420c1cc3c786a12d363461a11dc89\" returns successfully" May 10 00:45:46.104745 env[1555]: time="2025-05-10T00:45:46.104709363Z" level=info msg="StopPodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\"" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.143 [WARNING][5585] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d", Pod:"calico-apiserver-54f546bcdc-w8b2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b65e917725", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.143 [INFO][5585] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.143 [INFO][5585] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" iface="eth0" netns="" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.143 [INFO][5585] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.143 [INFO][5585] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.172 [INFO][5592] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.172 [INFO][5592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.172 [INFO][5592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.179 [WARNING][5592] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.179 [INFO][5592] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.181 [INFO][5592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.186696 env[1555]: 2025-05-10 00:45:46.183 [INFO][5585] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.189721 env[1555]: time="2025-05-10T00:45:46.186735647Z" level=info msg="TearDown network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" successfully" May 10 00:45:46.189721 env[1555]: time="2025-05-10T00:45:46.186767508Z" level=info msg="StopPodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" returns successfully" May 10 00:45:46.189721 env[1555]: time="2025-05-10T00:45:46.187193594Z" level=info msg="RemovePodSandbox for \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\"" May 10 00:45:46.189721 env[1555]: time="2025-05-10T00:45:46.187777434Z" level=info msg="Forcibly stopping sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\"" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.239 [WARNING][5613] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0", GenerateName:"calico-apiserver-54f546bcdc-", Namespace:"calico-apiserver", SelfLink:"", UID:"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54f546bcdc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d", Pod:"calico-apiserver-54f546bcdc-w8b2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.54.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8b65e917725", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.239 [INFO][5613] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.239 [INFO][5613] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" iface="eth0" netns="" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.239 [INFO][5613] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.239 [INFO][5613] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.270 [INFO][5620] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.270 [INFO][5620] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.270 [INFO][5620] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.276 [WARNING][5620] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.276 [INFO][5620] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" HandleID="k8s-pod-network.1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.278 [INFO][5620] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.282847 env[1555]: 2025-05-10 00:45:46.280 [INFO][5613] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7" May 10 00:45:46.282847 env[1555]: time="2025-05-10T00:45:46.282820210Z" level=info msg="TearDown network for sandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" successfully" May 10 00:45:46.288226 env[1555]: time="2025-05-10T00:45:46.288177906Z" level=info msg="RemovePodSandbox \"1ac93eb5da95d701db8b3666cb5ec7941eaa48206e4a6e5a747c9b2091c075d7\" returns successfully" May 10 00:45:46.299319 env[1555]: time="2025-05-10T00:45:46.299279279Z" level=info msg="StopPodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\"" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.342 [WARNING][5640] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb27db3f-e255-4e8f-8959-a138791be4d5", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b", Pod:"csi-node-driver-2gfcq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali556b1b911c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.342 [INFO][5640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.342 [INFO][5640] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" iface="eth0" netns="" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.342 [INFO][5640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.342 [INFO][5640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.367 [INFO][5647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.367 [INFO][5647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.367 [INFO][5647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.385 [WARNING][5647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.385 [INFO][5647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.387 [INFO][5647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.392929 env[1555]: 2025-05-10 00:45:46.389 [INFO][5640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.392929 env[1555]: time="2025-05-10T00:45:46.391347744Z" level=info msg="TearDown network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" successfully" May 10 00:45:46.392929 env[1555]: time="2025-05-10T00:45:46.391389075Z" level=info msg="StopPodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" returns successfully" May 10 00:45:46.395182 env[1555]: time="2025-05-10T00:45:46.393520272Z" level=info msg="RemovePodSandbox for \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\"" May 10 00:45:46.395182 env[1555]: time="2025-05-10T00:45:46.393564333Z" level=info msg="Forcibly stopping sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\"" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.438 [WARNING][5665] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"bb27db3f-e255-4e8f-8959-a138791be4d5", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-109", ContainerID:"e95a3c1f4508bfa014aaf0baefba7956e14165ce9b76145da8c685e0130a5b9b", Pod:"csi-node-driver-2gfcq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.54.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali556b1b911c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.438 [INFO][5665] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.438 [INFO][5665] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" iface="eth0" netns="" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.439 [INFO][5665] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.439 [INFO][5665] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.462 [INFO][5672] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.463 [INFO][5672] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.463 [INFO][5672] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.470 [WARNING][5672] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.470 [INFO][5672] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" HandleID="k8s-pod-network.d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" Workload="ip--172--31--18--109-k8s-csi--node--driver--2gfcq-eth0" May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.472 [INFO][5672] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.475998 env[1555]: 2025-05-10 00:45:46.474 [INFO][5665] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545" May 10 00:45:46.476837 env[1555]: time="2025-05-10T00:45:46.476032928Z" level=info msg="TearDown network for sandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" successfully" May 10 00:45:46.482184 env[1555]: time="2025-05-10T00:45:46.482107248Z" level=info msg="RemovePodSandbox \"d3a8481c9c3e55af366eab4ee5133ce8a9fe07d219b577595c638dca0db2a545\" returns successfully" May 10 00:45:46.846820 systemd[1]: run-containerd-runc-k8s.io-bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d-runc.mNV6pg.mount: Deactivated successfully. May 10 00:45:48.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.109:22-139.178.89.65:38760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.559244 systemd[1]: Started sshd@15-172.31.18.109:22-139.178.89.65:38760.service. May 10 00:45:48.564493 kernel: kauditd_printk_skb: 85 callbacks suppressed May 10 00:45:48.564576 kernel: audit: type=1130 audit(1746837948.558:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.109:22-139.178.89.65:38760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:48.796000 audit[5700]: USER_ACCT pid=5700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.798914 sshd[5700]: Accepted publickey for core from 139.178.89.65 port 38760 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:48.805110 kernel: audit: type=1101 audit(1746837948.796:1439): pid=5700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.804000 audit[5700]: CRED_ACQ pid=5700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.807733 sshd[5700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:48.813184 kernel: audit: type=1103 audit(1746837948.804:1440): pid=5700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.804000 audit[5700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d564c20 a2=3 a3=0 items=0 ppid=1 pid=5700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.825318 kernel: audit: type=1006 audit(1746837948.804:1441): pid=5700 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:45:48.825446 kernel: audit: type=1300 audit(1746837948.804:1441): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d564c20 a2=3 a3=0 items=0 ppid=1 pid=5700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.828608 kernel: audit: type=1327 audit(1746837948.804:1441): proctitle=737368643A20636F7265205B707269765D May 10 00:45:48.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:48.831316 systemd-logind[1540]: New session 16 of user core. May 10 00:45:48.832885 systemd[1]: Started session-16.scope. May 10 00:45:48.838000 audit[5700]: USER_START pid=5700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.847000 audit[5702]: CRED_ACQ pid=5702 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.855979 kernel: audit: type=1105 audit(1746837948.838:1442): pid=5700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:48.856116 kernel: audit: type=1103 audit(1746837948.847:1443): pid=5702 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:49.499174 sshd[5700]: pam_unix(sshd:session): session closed for user core May 10 00:45:49.499000 audit[5700]: USER_END pid=5700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:49.499000 audit[5700]: CRED_DISP pid=5700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:49.514999 kernel: audit: type=1106 audit(1746837949.499:1444): pid=5700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:49.515167 kernel: audit: type=1104 audit(1746837949.499:1445): pid=5700 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:49.515397 systemd[1]: sshd@15-172.31.18.109:22-139.178.89.65:38760.service: Deactivated successfully. May 10 00:45:49.516631 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:45:49.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.109:22-139.178.89.65:38760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:49.517531 systemd-logind[1540]: Session 16 logged out. Waiting for processes to exit. May 10 00:45:49.518755 systemd-logind[1540]: Removed session 16. May 10 00:45:54.531163 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:45:54.531327 kernel: audit: type=1130 audit(1746837954.525:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.109:22-139.178.89.65:38776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:54.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.109:22-139.178.89.65:38776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:54.526658 systemd[1]: Started sshd@16-172.31.18.109:22-139.178.89.65:38776.service. May 10 00:45:54.542108 kubelet[2527]: I0510 00:45:54.542050 2527 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:54.577954 kubelet[2527]: I0510 00:45:54.577917 2527 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:54.687000 audit[5716]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:54.687000 audit[5716]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaec480a0 a2=0 a3=7ffeaec4808c items=0 ppid=2758 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.701016 kernel: audit: type=1325 audit(1746837954.687:1448): table=filter:114 family=2 entries=8 op=nft_register_rule pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:54.701177 kernel: audit: type=1300 audit(1746837954.687:1448): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaec480a0 a2=0 a3=7ffeaec4808c items=0 ppid=2758 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.702211 kernel: audit: type=1327 audit(1746837954.687:1448): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:54.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:54.710000 audit[5713]: USER_ACCT pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.712125 sshd[5713]: Accepted publickey for core from 139.178.89.65 port 38776 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:45:54.719099 kernel: audit: type=1101 audit(1746837954.710:1449): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.719557 sshd[5713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:54.717000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.725111 systemd[1]: Started session-17.scope. May 10 00:45:54.726553 systemd-logind[1540]: New session 17 of user core. May 10 00:45:54.732482 kernel: audit: type=1103 audit(1746837954.717:1450): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.741105 kernel: audit: type=1006 audit(1746837954.717:1451): pid=5713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:45:54.717000 audit[5713]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd7d54ba0 a2=3 a3=0 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.751106 kernel: audit: type=1300 audit(1746837954.717:1451): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd7d54ba0 a2=3 a3=0 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.717000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:54.763822 kernel: audit: type=1327 audit(1746837954.717:1451): proctitle=737368643A20636F7265205B707269765D May 10 00:45:54.763947 kernel: audit: type=1105 audit(1746837954.733:1452): pid=5713 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.733000 audit[5713]: USER_START pid=5713 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.734000 audit[5716]: NETFILTER_CFG table=nat:115 family=2 entries=34 op=nft_register_chain pid=5716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:54.735000 audit[5717]: CRED_ACQ pid=5717 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:54.734000 audit[5716]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffeaec480a0 a2=0 a3=7ffeaec4808c items=0 ppid=2758 pid=5716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:54.794000 audit[5719]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=5719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:54.794000 audit[5719]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe12cd6f80 a2=0 a3=7ffe12cd6f6c items=0 ppid=2758 pid=5719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:54.800000 audit[5719]: NETFILTER_CFG table=nat:117 family=2 entries=38 op=nft_register_chain pid=5719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:54.800000 audit[5719]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffe12cd6f80 a2=0 a3=7ffe12cd6f6c items=0 ppid=2758 pid=5719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:54.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:55.006634 sshd[5713]: pam_unix(sshd:session): session closed for user core May 10 00:45:55.006000 audit[5713]: USER_END pid=5713 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:55.007000 audit[5713]: CRED_DISP pid=5713 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:45:55.009924 systemd[1]: sshd@16-172.31.18.109:22-139.178.89.65:38776.service: Deactivated successfully. May 10 00:45:55.010730 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:45:55.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.109:22-139.178.89.65:38776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:55.011470 systemd-logind[1540]: Session 17 logged out. Waiting for processes to exit. May 10 00:45:55.012488 systemd-logind[1540]: Removed session 17. May 10 00:45:55.470000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.471000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.471000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002487ae0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:45:55.471000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:55.470000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e3fac0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:45:55.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:55.488000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.488000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e3fd00 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:45:55.488000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:55.488000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.488000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e3fee0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:45:55.488000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:56.269513 env[1555]: time="2025-05-10T00:45:56.268771158Z" level=info msg="StopContainer for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" with timeout 30 (s)" May 10 00:45:56.271712 env[1555]: time="2025-05-10T00:45:56.271567406Z" level=info msg="Stop container \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" with signal terminated" May 10 00:45:56.306387 systemd[1]: cri-containerd-14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91.scope: Deactivated successfully. May 10 00:45:56.305000 audit: BPF prog-id=197 op=UNLOAD May 10 00:45:56.308000 audit: BPF prog-id=200 op=UNLOAD May 10 00:45:56.332889 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91-rootfs.mount: Deactivated successfully. May 10 00:45:56.384742 env[1555]: time="2025-05-10T00:45:56.384684212Z" level=info msg="shim disconnected" id=14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91 May 10 00:45:56.384742 env[1555]: time="2025-05-10T00:45:56.384740254Z" level=warning msg="cleaning up after shim disconnected" id=14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91 namespace=k8s.io May 10 00:45:56.386065 env[1555]: time="2025-05-10T00:45:56.384757896Z" level=info msg="cleaning up dead shim" May 10 00:45:56.402379 env[1555]: time="2025-05-10T00:45:56.402305004Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5752 runtime=io.containerd.runc.v2\n" May 10 00:45:56.411124 env[1555]: time="2025-05-10T00:45:56.408718345Z" level=info msg="StopContainer for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" returns successfully" May 10 00:45:56.415387 env[1555]: time="2025-05-10T00:45:56.415345890Z" level=info msg="StopPodSandbox for \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\"" May 10 00:45:56.415751 env[1555]: time="2025-05-10T00:45:56.415718589Z" level=info msg="Container to stop \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:45:56.422046 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806-shm.mount: Deactivated successfully. May 10 00:45:56.440000 audit: BPF prog-id=143 op=UNLOAD May 10 00:45:56.440765 systemd[1]: cri-containerd-a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806.scope: Deactivated successfully. May 10 00:45:56.444000 audit: BPF prog-id=146 op=UNLOAD May 10 00:45:56.478581 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806-rootfs.mount: Deactivated successfully. May 10 00:45:56.481568 env[1555]: time="2025-05-10T00:45:56.481516613Z" level=info msg="shim disconnected" id=a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806 May 10 00:45:56.482573 env[1555]: time="2025-05-10T00:45:56.481818172Z" level=warning msg="cleaning up after shim disconnected" id=a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806 namespace=k8s.io May 10 00:45:56.482573 env[1555]: time="2025-05-10T00:45:56.481837280Z" level=info msg="cleaning up dead shim" May 10 00:45:56.499603 env[1555]: time="2025-05-10T00:45:56.499554990Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5784 runtime=io.containerd.runc.v2\n" May 10 00:45:56.601609 systemd-networkd[1276]: cali77ff7b216bc: Link DOWN May 10 00:45:56.601616 systemd-networkd[1276]: cali77ff7b216bc: Lost carrier May 10 00:45:56.658000 audit[5830]: NETFILTER_CFG table=filter:118 family=2 entries=56 op=nft_register_rule pid=5830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:56.658000 audit[5830]: SYSCALL arch=c000003e syscall=46 success=yes exit=9080 a0=3 a1=7ffe313bb070 a2=0 a3=7ffe313bb05c items=0 ppid=4722 pid=5830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:56.658000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:56.660000 audit[5830]: NETFILTER_CFG table=filter:119 family=2 entries=4 op=nft_unregister_chain pid=5830 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:56.660000 audit[5830]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffe313bb070 a2=0 a3=561300cd3000 items=0 ppid=4722 pid=5830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:56.660000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.593 [INFO][5811] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.593 [INFO][5811] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" iface="eth0" netns="/var/run/netns/cni-007c7f3d-b652-d74d-f4ad-c39300f42055" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.594 [INFO][5811] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" iface="eth0" netns="/var/run/netns/cni-007c7f3d-b652-d74d-f4ad-c39300f42055" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.607 [INFO][5811] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" after=13.218901ms iface="eth0" netns="/var/run/netns/cni-007c7f3d-b652-d74d-f4ad-c39300f42055" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.607 [INFO][5811] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.607 [INFO][5811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.645 [INFO][5818] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.646 [INFO][5818] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.646 [INFO][5818] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.705 [INFO][5818] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.705 [INFO][5818] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.708 [INFO][5818] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:56.715846 env[1555]: 2025-05-10 00:45:56.710 [INFO][5811] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:45:56.720532 env[1555]: time="2025-05-10T00:45:56.716148593Z" level=info msg="TearDown network for sandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" successfully" May 10 00:45:56.720532 env[1555]: time="2025-05-10T00:45:56.716179991Z" level=info msg="StopPodSandbox for \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" returns successfully" May 10 00:45:56.718927 systemd[1]: run-netns-cni\x2d007c7f3d\x2db652\x2dd74d\x2df4ad\x2dc39300f42055.mount: Deactivated successfully. May 10 00:45:56.760000 audit[5832]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=5832 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:56.760000 audit[5832]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffdcd0b9a0 a2=0 a3=7fffdcd0b98c items=0 ppid=2758 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:56.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:56.766000 audit[5832]: NETFILTER_CFG table=nat:121 family=2 entries=36 op=nft_register_rule pid=5832 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:56.766000 audit[5832]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffdcd0b9a0 a2=0 a3=7fffdcd0b98c items=0 ppid=2758 pid=5832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:56.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:56.847159 kubelet[2527]: I0510 00:45:56.847111 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39c8f9b3-ad10-496b-998d-2c423031e9dc-calico-apiserver-certs\") pod \"39c8f9b3-ad10-496b-998d-2c423031e9dc\" (UID: \"39c8f9b3-ad10-496b-998d-2c423031e9dc\") " May 10 00:45:56.847712 kubelet[2527]: I0510 00:45:56.847190 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-ks28d\" (UniqueName: \"kubernetes.io/projected/39c8f9b3-ad10-496b-998d-2c423031e9dc-kube-api-access-ks28d\") pod \"39c8f9b3-ad10-496b-998d-2c423031e9dc\" (UID: \"39c8f9b3-ad10-496b-998d-2c423031e9dc\") " May 10 00:45:56.877883 systemd[1]: var-lib-kubelet-pods-39c8f9b3\x2dad10\x2d496b\x2d998d\x2d2c423031e9dc-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dks28d.mount: Deactivated successfully. May 10 00:45:56.881567 kubelet[2527]: I0510 00:45:56.881514 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/39c8f9b3-ad10-496b-998d-2c423031e9dc-kube-api-access-ks28d" (OuterVolumeSpecName: "kube-api-access-ks28d") pod "39c8f9b3-ad10-496b-998d-2c423031e9dc" (UID: "39c8f9b3-ad10-496b-998d-2c423031e9dc"). InnerVolumeSpecName "kube-api-access-ks28d". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:45:56.882017 kubelet[2527]: I0510 00:45:56.881990 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/39c8f9b3-ad10-496b-998d-2c423031e9dc-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "39c8f9b3-ad10-496b-998d-2c423031e9dc" (UID: "39c8f9b3-ad10-496b-998d-2c423031e9dc"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:45:56.948540 kubelet[2527]: I0510 00:45:56.948475 2527 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39c8f9b3-ad10-496b-998d-2c423031e9dc-calico-apiserver-certs\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:45:56.948540 kubelet[2527]: I0510 00:45:56.948520 2527 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-ks28d\" (UniqueName: \"kubernetes.io/projected/39c8f9b3-ad10-496b-998d-2c423031e9dc-kube-api-access-ks28d\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:45:57.276895 kubelet[2527]: I0510 00:45:57.276859 2527 scope.go:117] "RemoveContainer" containerID="14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91" May 10 00:45:57.279864 env[1555]: time="2025-05-10T00:45:57.279488726Z" level=info msg="RemoveContainer for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\"" May 10 00:45:57.284571 systemd[1]: Removed slice kubepods-besteffort-pod39c8f9b3_ad10_496b_998d_2c423031e9dc.slice. May 10 00:45:57.287331 env[1555]: time="2025-05-10T00:45:57.287284657Z" level=info msg="RemoveContainer for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" returns successfully" May 10 00:45:57.290665 kubelet[2527]: I0510 00:45:57.290627 2527 scope.go:117] "RemoveContainer" containerID="14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91" May 10 00:45:57.294811 env[1555]: time="2025-05-10T00:45:57.294645463Z" level=error msg="ContainerStatus for \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\": not found" May 10 00:45:57.302895 kubelet[2527]: E0510 00:45:57.302839 2527 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\": not found" containerID="14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91" May 10 00:45:57.308258 kubelet[2527]: I0510 00:45:57.305410 2527 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91"} err="failed to get container status \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\": rpc error: code = NotFound desc = an error occurred when try to find container \"14ab1ea46e75d9e852a2f4424c72c173cc8dd60656680743142b631d1607cd91\": not found" May 10 00:45:57.331589 systemd[1]: var-lib-kubelet-pods-39c8f9b3\x2dad10\x2d496b\x2d998d\x2d2c423031e9dc-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:45:57.790878 kubelet[2527]: I0510 00:45:57.790829 2527 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="39c8f9b3-ad10-496b-998d-2c423031e9dc" path="/var/lib/kubelet/pods/39c8f9b3-ad10-496b-998d-2c423031e9dc/volumes" May 10 00:46:00.068713 systemd[1]: Started sshd@17-172.31.18.109:22-139.178.89.65:38192.service. May 10 00:46:00.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.109:22-139.178.89.65:38192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.075143 kernel: kauditd_printk_skb: 41 callbacks suppressed May 10 00:46:00.075277 kernel: audit: type=1130 audit(1746837960.068:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.109:22-139.178.89.65:38192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.270000 audit[5838]: USER_ACCT pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.272106 sshd[5838]: Accepted publickey for core from 139.178.89.65 port 38192 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:00.276146 kernel: audit: type=1101 audit(1746837960.270:1473): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.285097 kernel: audit: type=1103 audit(1746837960.275:1474): pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.285209 kernel: audit: type=1006 audit(1746837960.275:1475): pid=5838 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:46:00.285253 kernel: audit: type=1300 audit(1746837960.275:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2973b830 a2=3 a3=0 items=0 ppid=1 pid=5838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.275000 audit[5838]: CRED_ACQ pid=5838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.275000 audit[5838]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2973b830 a2=3 a3=0 items=0 ppid=1 pid=5838 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.278516 sshd[5838]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.275000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:00.290124 kernel: audit: type=1327 audit(1746837960.275:1475): proctitle=737368643A20636F7265205B707269765D May 10 00:46:00.293708 systemd[1]: Started session-18.scope. May 10 00:46:00.295211 systemd-logind[1540]: New session 18 of user core. May 10 00:46:00.301000 audit[5838]: USER_START pid=5838 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.308741 kernel: audit: type=1105 audit(1746837960.301:1476): pid=5838 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.306000 audit[5840]: CRED_ACQ pid=5840 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.314140 kernel: audit: type=1103 audit(1746837960.306:1477): pid=5840 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.564051 env[1555]: time="2025-05-10T00:46:00.562950448Z" level=info msg="StopContainer for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" with timeout 300 (s)" May 10 00:46:00.564051 env[1555]: time="2025-05-10T00:46:00.563456282Z" level=info msg="Stop container \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" with signal terminated" May 10 00:46:00.619475 sshd[5838]: pam_unix(sshd:session): session closed for user core May 10 00:46:00.621000 audit[5838]: USER_END pid=5838 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.625184 systemd[1]: sshd@17-172.31.18.109:22-139.178.89.65:38192.service: Deactivated successfully. May 10 00:46:00.633272 kernel: audit: type=1106 audit(1746837960.621:1478): pid=5838 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.632401 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:46:00.621000 audit[5838]: CRED_DISP pid=5838 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.634122 systemd-logind[1540]: Session 18 logged out. Waiting for processes to exit. May 10 00:46:00.635682 systemd-logind[1540]: Removed session 18. May 10 00:46:00.644647 kernel: audit: type=1104 audit(1746837960.621:1479): pid=5838 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.109:22-139.178.89.65:38192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.652352 systemd[1]: Started sshd@18-172.31.18.109:22-139.178.89.65:38198.service. May 10 00:46:00.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.109:22-139.178.89.65:38198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:00.697000 audit[5860]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=5860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:00.697000 audit[5860]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffaa2bb3c0 a2=0 a3=7fffaa2bb3ac items=0 ppid=2758 pid=5860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:00.702000 audit[5860]: NETFILTER_CFG table=nat:123 family=2 entries=30 op=nft_register_rule pid=5860 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:00.702000 audit[5860]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffaa2bb3c0 a2=0 a3=7fffaa2bb3ac items=0 ppid=2758 pid=5860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:00.732000 audit[5862]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:00.732000 audit[5862]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcf81f7ff0 a2=0 a3=7ffcf81f7fdc items=0 ppid=2758 pid=5862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:00.749000 audit[5862]: NETFILTER_CFG table=nat:125 family=2 entries=30 op=nft_register_rule pid=5862 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:00.749000 audit[5862]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffcf81f7ff0 a2=0 a3=7ffcf81f7fdc items=0 ppid=2758 pid=5862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:00.780658 systemd[1]: run-containerd-runc-k8s.io-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d-runc.wGXY64.mount: Deactivated successfully. May 10 00:46:00.826000 audit[5857]: USER_ACCT pid=5857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.828863 sshd[5857]: Accepted publickey for core from 139.178.89.65 port 38198 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:00.827000 audit[5857]: CRED_ACQ pid=5857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.828000 audit[5857]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb119acd0 a2=3 a3=0 items=0 ppid=1 pid=5857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:00.830493 sshd[5857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:00.837261 systemd[1]: Started session-19.scope. May 10 00:46:00.839108 systemd-logind[1540]: New session 19 of user core. May 10 00:46:00.847000 audit[5857]: USER_START pid=5857 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.849000 audit[5879]: CRED_ACQ pid=5879 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:00.967870 env[1555]: time="2025-05-10T00:46:00.967833155Z" level=info msg="StopContainer for \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\" with timeout 30 (s)" May 10 00:46:00.968476 env[1555]: time="2025-05-10T00:46:00.968444835Z" level=info msg="Stop container \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\" with signal terminated" May 10 00:46:00.980051 systemd[1]: cri-containerd-bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d.scope: Deactivated successfully. May 10 00:46:00.979000 audit: BPF prog-id=212 op=UNLOAD May 10 00:46:00.983000 audit: BPF prog-id=215 op=UNLOAD May 10 00:46:01.020105 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d-rootfs.mount: Deactivated successfully. May 10 00:46:01.058580 env[1555]: time="2025-05-10T00:46:01.058535360Z" level=info msg="shim disconnected" id=bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d May 10 00:46:01.059011 env[1555]: time="2025-05-10T00:46:01.058989690Z" level=warning msg="cleaning up after shim disconnected" id=bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d namespace=k8s.io May 10 00:46:01.059111 env[1555]: time="2025-05-10T00:46:01.059098728Z" level=info msg="cleaning up dead shim" May 10 00:46:01.070741 env[1555]: time="2025-05-10T00:46:01.070698877Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5909 runtime=io.containerd.runc.v2\n" May 10 00:46:01.075454 env[1555]: time="2025-05-10T00:46:01.075402748Z" level=info msg="StopContainer for \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\" returns successfully" May 10 00:46:01.089249 env[1555]: time="2025-05-10T00:46:01.078660654Z" level=info msg="StopPodSandbox for \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\"" May 10 00:46:01.089249 env[1555]: time="2025-05-10T00:46:01.078737225Z" level=info msg="Container to stop \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:01.088922 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394-shm.mount: Deactivated successfully. May 10 00:46:01.102116 systemd[1]: cri-containerd-4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394.scope: Deactivated successfully. May 10 00:46:01.101000 audit: BPF prog-id=193 op=UNLOAD May 10 00:46:01.105000 audit: BPF prog-id=196 op=UNLOAD May 10 00:46:01.146836 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394-rootfs.mount: Deactivated successfully. May 10 00:46:01.159882 env[1555]: time="2025-05-10T00:46:01.159821496Z" level=info msg="shim disconnected" id=4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394 May 10 00:46:01.160177 env[1555]: time="2025-05-10T00:46:01.160151562Z" level=warning msg="cleaning up after shim disconnected" id=4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394 namespace=k8s.io May 10 00:46:01.160407 env[1555]: time="2025-05-10T00:46:01.160176564Z" level=info msg="cleaning up dead shim" May 10 00:46:01.175920 env[1555]: time="2025-05-10T00:46:01.175751341Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5941 runtime=io.containerd.runc.v2\n" May 10 00:46:01.272116 kubelet[2527]: I0510 00:46:01.272073 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:01.304997 systemd-networkd[1276]: cali23729e803ee: Link DOWN May 10 00:46:01.305004 systemd-networkd[1276]: cali23729e803ee: Lost carrier May 10 00:46:01.483000 audit[5988]: NETFILTER_CFG table=filter:126 family=2 entries=46 op=nft_register_rule pid=5988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:01.483000 audit[5988]: SYSCALL arch=c000003e syscall=46 success=yes exit=7908 a0=3 a1=7fff5fec7460 a2=0 a3=7fff5fec744c items=0 ppid=4722 pid=5988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:01.483000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:01.484000 audit[5988]: NETFILTER_CFG table=filter:127 family=2 entries=4 op=nft_unregister_chain pid=5988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:01.484000 audit[5988]: SYSCALL arch=c000003e syscall=46 success=yes exit=592 a0=3 a1=7fff5fec7460 a2=0 a3=556b8441a000 items=0 ppid=4722 pid=5988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:01.484000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.302 [INFO][5969] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.302 [INFO][5969] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" iface="eth0" netns="/var/run/netns/cni-94deaade-7501-68b1-ecc0-b542f382ec52" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.302 [INFO][5969] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" iface="eth0" netns="/var/run/netns/cni-94deaade-7501-68b1-ecc0-b542f382ec52" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.315 [INFO][5969] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" after=13.083504ms iface="eth0" netns="/var/run/netns/cni-94deaade-7501-68b1-ecc0-b542f382ec52" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.316 [INFO][5969] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.316 [INFO][5969] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.394 [INFO][5979] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.395 [INFO][5979] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.395 [INFO][5979] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.533 [INFO][5979] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.533 [INFO][5979] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.537 [INFO][5979] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:01.542934 env[1555]: 2025-05-10 00:46:01.540 [INFO][5969] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:01.545227 env[1555]: time="2025-05-10T00:46:01.544584395Z" level=info msg="TearDown network for sandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" successfully" May 10 00:46:01.545227 env[1555]: time="2025-05-10T00:46:01.544675167Z" level=info msg="StopPodSandbox for \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" returns successfully" May 10 00:46:01.699729 kubelet[2527]: I0510 00:46:01.699690 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-qhrhl\" (UniqueName: \"kubernetes.io/projected/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-kube-api-access-qhrhl\") pod \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\" (UID: \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\") " May 10 00:46:01.701736 kubelet[2527]: I0510 00:46:01.701701 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-tigera-ca-bundle\") pod \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\" (UID: \"a391f88f-8f1f-414e-8d1f-6cd0df0cb271\") " May 10 00:46:01.739178 kubelet[2527]: I0510 00:46:01.739030 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "a391f88f-8f1f-414e-8d1f-6cd0df0cb271" (UID: "a391f88f-8f1f-414e-8d1f-6cd0df0cb271"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:46:01.744616 kubelet[2527]: I0510 00:46:01.744553 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-kube-api-access-qhrhl" (OuterVolumeSpecName: "kube-api-access-qhrhl") pod "a391f88f-8f1f-414e-8d1f-6cd0df0cb271" (UID: "a391f88f-8f1f-414e-8d1f-6cd0df0cb271"). InnerVolumeSpecName "kube-api-access-qhrhl". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:01.765828 systemd[1]: var-lib-kubelet-pods-a391f88f\x2d8f1f\x2d414e\x2d8d1f\x2d6cd0df0cb271-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 10 00:46:01.765965 systemd[1]: run-netns-cni\x2d94deaade\x2d7501\x2d68b1\x2decc0\x2db542f382ec52.mount: Deactivated successfully. May 10 00:46:01.766053 systemd[1]: var-lib-kubelet-pods-a391f88f\x2d8f1f\x2d414e\x2d8d1f\x2d6cd0df0cb271-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dqhrhl.mount: Deactivated successfully. May 10 00:46:01.784000 audit[5999]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=5999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:01.784000 audit[5999]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0ae10bf0 a2=0 a3=7ffd0ae10bdc items=0 ppid=2758 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:01.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:01.794000 audit[5999]: NETFILTER_CFG table=nat:129 family=2 entries=36 op=nft_register_rule pid=5999 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:01.794000 audit[5999]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0ae10bf0 a2=0 a3=7ffd0ae10bdc items=0 ppid=2758 pid=5999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:01.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:01.803936 kubelet[2527]: I0510 00:46:01.803899 2527 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-qhrhl\" (UniqueName: \"kubernetes.io/projected/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-kube-api-access-qhrhl\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:01.805107 sshd[5857]: pam_unix(sshd:session): session closed for user core May 10 00:46:01.805769 kubelet[2527]: I0510 00:46:01.805735 2527 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a391f88f-8f1f-414e-8d1f-6cd0df0cb271-tigera-ca-bundle\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:01.815000 audit[5857]: USER_END pid=5857 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:01.816000 audit[5857]: CRED_DISP pid=5857 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:01.836788 systemd[1]: Started sshd@19-172.31.18.109:22-139.178.89.65:38214.service. May 10 00:46:01.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.109:22-139.178.89.65:38214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:01.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.109:22-139.178.89.65:38198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:01.840449 systemd[1]: sshd@18-172.31.18.109:22-139.178.89.65:38198.service: Deactivated successfully. May 10 00:46:01.841807 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:46:01.845055 systemd-logind[1540]: Session 19 logged out. Waiting for processes to exit. May 10 00:46:01.847494 systemd-logind[1540]: Removed session 19. May 10 00:46:01.858607 systemd[1]: Removed slice kubepods-besteffort-poda391f88f_8f1f_414e_8d1f_6cd0df0cb271.slice. May 10 00:46:01.960426 env[1555]: time="2025-05-10T00:46:01.960377643Z" level=info msg="StopContainer for \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\" with timeout 4 (s)" May 10 00:46:01.962851 env[1555]: time="2025-05-10T00:46:01.962800736Z" level=info msg="Stop container \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\" with signal terminated" May 10 00:46:02.036712 systemd[1]: cri-containerd-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d.scope: Deactivated successfully. May 10 00:46:02.037033 systemd[1]: cri-containerd-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d.scope: Consumed 3.282s CPU time. May 10 00:46:02.060000 audit[6001]: USER_ACCT pid=6001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:02.062508 sshd[6001]: Accepted publickey for core from 139.178.89.65 port 38214 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:02.062000 audit[6001]: CRED_ACQ pid=6001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:02.062000 audit[6001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc79213f40 a2=3 a3=0 items=0 ppid=1 pid=6001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.062000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:02.064493 sshd[6001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:02.072918 systemd[1]: Started session-20.scope. May 10 00:46:02.075314 systemd-logind[1540]: New session 20 of user core. May 10 00:46:02.081000 audit[6001]: USER_START pid=6001 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:02.083000 audit[6024]: CRED_ACQ pid=6024 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:02.097786 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d-rootfs.mount: Deactivated successfully. May 10 00:46:02.102069 env[1555]: time="2025-05-10T00:46:02.102013663Z" level=info msg="shim disconnected" id=1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d May 10 00:46:02.102247 env[1555]: time="2025-05-10T00:46:02.102184396Z" level=warning msg="cleaning up after shim disconnected" id=1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d namespace=k8s.io May 10 00:46:02.102247 env[1555]: time="2025-05-10T00:46:02.102203937Z" level=info msg="cleaning up dead shim" May 10 00:46:02.118747 env[1555]: time="2025-05-10T00:46:02.118292119Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6026 runtime=io.containerd.runc.v2\n" May 10 00:46:02.189522 env[1555]: time="2025-05-10T00:46:02.189453407Z" level=info msg="StopContainer for \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\" returns successfully" May 10 00:46:02.190735 env[1555]: time="2025-05-10T00:46:02.190692995Z" level=info msg="StopPodSandbox for \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\"" May 10 00:46:02.190991 env[1555]: time="2025-05-10T00:46:02.190958533Z" level=info msg="Container to stop \"56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:02.191136 env[1555]: time="2025-05-10T00:46:02.191113862Z" level=info msg="Container to stop \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:02.191251 env[1555]: time="2025-05-10T00:46:02.191230481Z" level=info msg="Container to stop \"7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:02.197783 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d-shm.mount: Deactivated successfully. May 10 00:46:02.209000 audit: BPF prog-id=122 op=UNLOAD May 10 00:46:02.210123 systemd[1]: cri-containerd-5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d.scope: Deactivated successfully. May 10 00:46:02.213000 audit: BPF prog-id=125 op=UNLOAD May 10 00:46:02.254447 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d-rootfs.mount: Deactivated successfully. May 10 00:46:02.257317 env[1555]: time="2025-05-10T00:46:02.257261491Z" level=info msg="shim disconnected" id=5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d May 10 00:46:02.257483 env[1555]: time="2025-05-10T00:46:02.257320766Z" level=warning msg="cleaning up after shim disconnected" id=5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d namespace=k8s.io May 10 00:46:02.257483 env[1555]: time="2025-05-10T00:46:02.257336625Z" level=info msg="cleaning up dead shim" May 10 00:46:02.279633 env[1555]: time="2025-05-10T00:46:02.278575192Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6064 runtime=io.containerd.runc.v2\n" May 10 00:46:02.298698 env[1555]: time="2025-05-10T00:46:02.298576444Z" level=info msg="TearDown network for sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" successfully" May 10 00:46:02.298698 env[1555]: time="2025-05-10T00:46:02.298626124Z" level=info msg="StopPodSandbox for \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" returns successfully" May 10 00:46:02.413911 kubelet[2527]: I0510 00:46:02.413864 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-net-dir\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.413911 kubelet[2527]: I0510 00:46:02.413918 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-flexvol-driver-host\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414492 kubelet[2527]: I0510 00:46:02.413944 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-policysync\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414492 kubelet[2527]: I0510 00:46:02.414011 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/610017dd-5779-4f6a-8bda-ec7df7c6090f-node-certs\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414492 kubelet[2527]: I0510 00:46:02.414035 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-xtables-lock\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414492 kubelet[2527]: I0510 00:46:02.414060 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-log-dir\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414492 kubelet[2527]: I0510 00:46:02.414107 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-lib-modules\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414492 kubelet[2527]: I0510 00:46:02.414128 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-run-calico\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414845 kubelet[2527]: I0510 00:46:02.414148 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-lib-calico\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414845 kubelet[2527]: I0510 00:46:02.414181 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-2h4jc\" (UniqueName: \"kubernetes.io/projected/610017dd-5779-4f6a-8bda-ec7df7c6090f-kube-api-access-2h4jc\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414845 kubelet[2527]: I0510 00:46:02.414207 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/610017dd-5779-4f6a-8bda-ec7df7c6090f-tigera-ca-bundle\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.414845 kubelet[2527]: I0510 00:46:02.414230 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-bin-dir\") pod \"610017dd-5779-4f6a-8bda-ec7df7c6090f\" (UID: \"610017dd-5779-4f6a-8bda-ec7df7c6090f\") " May 10 00:46:02.415070 kubelet[2527]: I0510 00:46:02.414975 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-policysync" (OuterVolumeSpecName: "policysync") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416129 kubelet[2527]: I0510 00:46:02.415138 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416129 kubelet[2527]: I0510 00:46:02.415160 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416129 kubelet[2527]: I0510 00:46:02.415171 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416129 kubelet[2527]: I0510 00:46:02.415190 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416129 kubelet[2527]: I0510 00:46:02.415203 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416406 kubelet[2527]: I0510 00:46:02.415277 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416406 kubelet[2527]: I0510 00:46:02.415306 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.416406 kubelet[2527]: I0510 00:46:02.415336 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:02.426522 systemd[1]: var-lib-kubelet-pods-610017dd\x2d5779\x2d4f6a\x2d8bda\x2dec7df7c6090f-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 00:46:02.426680 systemd[1]: var-lib-kubelet-pods-610017dd\x2d5779\x2d4f6a\x2d8bda\x2dec7df7c6090f-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 00:46:02.437490 kubelet[2527]: I0510 00:46:02.437444 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/610017dd-5779-4f6a-8bda-ec7df7c6090f-node-certs" (OuterVolumeSpecName: "node-certs") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:46:02.443659 kubelet[2527]: I0510 00:46:02.443614 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/610017dd-5779-4f6a-8bda-ec7df7c6090f-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:46:02.454352 kubelet[2527]: I0510 00:46:02.454303 2527 topology_manager.go:215] "Topology Admit Handler" podUID="5ca29c95-610f-467d-afa4-a69587e0ed16" podNamespace="calico-system" podName="calico-node-59zhr" May 10 00:46:02.460232 kubelet[2527]: I0510 00:46:02.460177 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/610017dd-5779-4f6a-8bda-ec7df7c6090f-kube-api-access-2h4jc" (OuterVolumeSpecName: "kube-api-access-2h4jc") pod "610017dd-5779-4f6a-8bda-ec7df7c6090f" (UID: "610017dd-5779-4f6a-8bda-ec7df7c6090f"). InnerVolumeSpecName "kube-api-access-2h4jc". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:02.472661 kubelet[2527]: E0510 00:46:02.472618 2527 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="a391f88f-8f1f-414e-8d1f-6cd0df0cb271" containerName="calico-kube-controllers" May 10 00:46:02.472853 kubelet[2527]: E0510 00:46:02.472691 2527 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="610017dd-5779-4f6a-8bda-ec7df7c6090f" containerName="flexvol-driver" May 10 00:46:02.472853 kubelet[2527]: E0510 00:46:02.472703 2527 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="610017dd-5779-4f6a-8bda-ec7df7c6090f" containerName="calico-node" May 10 00:46:02.472853 kubelet[2527]: E0510 00:46:02.472712 2527 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="610017dd-5779-4f6a-8bda-ec7df7c6090f" containerName="install-cni" May 10 00:46:02.472853 kubelet[2527]: E0510 00:46:02.472721 2527 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="39c8f9b3-ad10-496b-998d-2c423031e9dc" containerName="calico-apiserver" May 10 00:46:02.477598 kubelet[2527]: I0510 00:46:02.477558 2527 memory_manager.go:354] "RemoveStaleState removing state" podUID="610017dd-5779-4f6a-8bda-ec7df7c6090f" containerName="calico-node" May 10 00:46:02.477598 kubelet[2527]: I0510 00:46:02.477606 2527 memory_manager.go:354] "RemoveStaleState removing state" podUID="a391f88f-8f1f-414e-8d1f-6cd0df0cb271" containerName="calico-kube-controllers" May 10 00:46:02.477828 kubelet[2527]: I0510 00:46:02.477619 2527 memory_manager.go:354] "RemoveStaleState removing state" podUID="39c8f9b3-ad10-496b-998d-2c423031e9dc" containerName="calico-apiserver" May 10 00:46:02.500743 systemd[1]: Created slice kubepods-besteffort-pod5ca29c95_610f_467d_afa4_a69587e0ed16.slice. May 10 00:46:02.517280 kubelet[2527]: I0510 00:46:02.517249 2527 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-2h4jc\" (UniqueName: \"kubernetes.io/projected/610017dd-5779-4f6a-8bda-ec7df7c6090f-kube-api-access-2h4jc\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.517518 kubelet[2527]: I0510 00:46:02.517500 2527 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/610017dd-5779-4f6a-8bda-ec7df7c6090f-tigera-ca-bundle\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.517617 kubelet[2527]: I0510 00:46:02.517606 2527 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-bin-dir\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.517701 kubelet[2527]: I0510 00:46:02.517690 2527 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-flexvol-driver-host\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.517778 kubelet[2527]: I0510 00:46:02.517768 2527 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-net-dir\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.517890 kubelet[2527]: I0510 00:46:02.517879 2527 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-policysync\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.517967 kubelet[2527]: I0510 00:46:02.517957 2527 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-xtables-lock\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.518039 kubelet[2527]: I0510 00:46:02.518030 2527 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-cni-log-dir\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.518127 kubelet[2527]: I0510 00:46:02.518116 2527 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/610017dd-5779-4f6a-8bda-ec7df7c6090f-node-certs\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.518210 kubelet[2527]: I0510 00:46:02.518200 2527 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-lib-modules\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.518284 kubelet[2527]: I0510 00:46:02.518274 2527 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-run-calico\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.518362 kubelet[2527]: I0510 00:46:02.518352 2527 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/610017dd-5779-4f6a-8bda-ec7df7c6090f-var-lib-calico\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:02.627650 kubelet[2527]: I0510 00:46:02.627513 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-policysync\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.627919 kubelet[2527]: I0510 00:46:02.627871 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-flexvol-driver-host\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.628715 kubelet[2527]: I0510 00:46:02.628680 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5ca29c95-610f-467d-afa4-a69587e0ed16-tigera-ca-bundle\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.629015 kubelet[2527]: I0510 00:46:02.628998 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-cni-bin-dir\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.629237 kubelet[2527]: I0510 00:46:02.629196 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-cni-log-dir\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.629786 kubelet[2527]: I0510 00:46:02.629741 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5ca29c95-610f-467d-afa4-a69587e0ed16-node-certs\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.630127 kubelet[2527]: I0510 00:46:02.630108 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-cni-net-dir\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.630280 kubelet[2527]: I0510 00:46:02.630262 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-var-lib-calico\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.630405 kubelet[2527]: I0510 00:46:02.630387 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7bp2m\" (UniqueName: \"kubernetes.io/projected/5ca29c95-610f-467d-afa4-a69587e0ed16-kube-api-access-7bp2m\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.630534 kubelet[2527]: I0510 00:46:02.630519 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-lib-modules\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.630649 kubelet[2527]: I0510 00:46:02.630635 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-xtables-lock\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.630763 kubelet[2527]: I0510 00:46:02.630749 2527 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5ca29c95-610f-467d-afa4-a69587e0ed16-var-run-calico\") pod \"calico-node-59zhr\" (UID: \"5ca29c95-610f-467d-afa4-a69587e0ed16\") " pod="calico-system/calico-node-59zhr" May 10 00:46:02.770441 systemd[1]: var-lib-kubelet-pods-610017dd\x2d5779\x2d4f6a\x2d8bda\x2dec7df7c6090f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d2h4jc.mount: Deactivated successfully. May 10 00:46:02.827954 env[1555]: time="2025-05-10T00:46:02.827278318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-59zhr,Uid:5ca29c95-610f-467d-afa4-a69587e0ed16,Namespace:calico-system,Attempt:0,}" May 10 00:46:02.858954 env[1555]: time="2025-05-10T00:46:02.858882006Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:02.859201 env[1555]: time="2025-05-10T00:46:02.859176528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:02.859303 env[1555]: time="2025-05-10T00:46:02.859282192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:02.859552 env[1555]: time="2025-05-10T00:46:02.859513567Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8 pid=6089 runtime=io.containerd.runc.v2 May 10 00:46:02.898829 systemd[1]: Started cri-containerd-c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8.scope. May 10 00:46:02.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.925000 audit: BPF prog-id=216 op=LOAD May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=6089 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396534613335636337363735353366373338653736363363366339 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=6089 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396534613335636337363735353366373338653736363363366339 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit: BPF prog-id=217 op=LOAD May 10 00:46:02.926000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219100 items=0 ppid=6089 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396534613335636337363735353366373338653736363363366339 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit: BPF prog-id=218 op=LOAD May 10 00:46:02.926000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219148 items=0 ppid=6089 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396534613335636337363735353366373338653736363363366339 May 10 00:46:02.926000 audit: BPF prog-id=218 op=UNLOAD May 10 00:46:02.926000 audit: BPF prog-id=217 op=UNLOAD May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:02.926000 audit: BPF prog-id=219 op=LOAD May 10 00:46:02.926000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219558 items=0 ppid=6089 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:02.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334396534613335636337363735353366373338653736363363366339 May 10 00:46:02.962752 env[1555]: time="2025-05-10T00:46:02.962704403Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-59zhr,Uid:5ca29c95-610f-467d-afa4-a69587e0ed16,Namespace:calico-system,Attempt:0,} returns sandbox id \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\"" May 10 00:46:02.982310 env[1555]: time="2025-05-10T00:46:02.982264119Z" level=info msg="CreateContainer within sandbox \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:46:03.016025 env[1555]: time="2025-05-10T00:46:03.015970944Z" level=info msg="CreateContainer within sandbox \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c\"" May 10 00:46:03.017121 env[1555]: time="2025-05-10T00:46:03.017067958Z" level=info msg="StartContainer for \"5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c\"" May 10 00:46:03.056910 systemd[1]: Started cri-containerd-5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c.scope. May 10 00:46:03.095000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f1b08c5b418 items=0 ppid=6089 pid=6135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323462323866356230303461316361633335666634396635353434 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.095000 audit: BPF prog-id=220 op=LOAD May 10 00:46:03.095000 audit[6135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003e01d8 items=0 ppid=6089 pid=6135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323462323866356230303461316361633335666634396635353434 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit: BPF prog-id=221 op=LOAD May 10 00:46:03.096000 audit[6135]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003e0228 items=0 ppid=6089 pid=6135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323462323866356230303461316361633335666634396635353434 May 10 00:46:03.096000 audit: BPF prog-id=221 op=UNLOAD May 10 00:46:03.096000 audit: BPF prog-id=220 op=UNLOAD May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { perfmon } for pid=6135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit[6135]: AVC avc: denied { bpf } for pid=6135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:03.096000 audit: BPF prog-id=222 op=LOAD May 10 00:46:03.096000 audit[6135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003e02b8 items=0 ppid=6089 pid=6135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323462323866356230303461316361633335666634396635353434 May 10 00:46:03.134509 env[1555]: time="2025-05-10T00:46:03.134417253Z" level=info msg="StartContainer for \"5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c\" returns successfully" May 10 00:46:03.292809 kubelet[2527]: I0510 00:46:03.292778 2527 scope.go:117] "RemoveContainer" containerID="1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d" May 10 00:46:03.299681 systemd[1]: Removed slice kubepods-besteffort-pod610017dd_5779_4f6a_8bda_ec7df7c6090f.slice. May 10 00:46:03.299815 systemd[1]: kubepods-besteffort-pod610017dd_5779_4f6a_8bda_ec7df7c6090f.slice: Consumed 3.898s CPU time. May 10 00:46:03.302176 env[1555]: time="2025-05-10T00:46:03.302131621Z" level=info msg="RemoveContainer for \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\"" May 10 00:46:03.308985 env[1555]: time="2025-05-10T00:46:03.308929207Z" level=info msg="RemoveContainer for \"1a9dcb1b26c252526eb61f282a4953fdb46855ac6d4127b9674fd1386d2a526d\" returns successfully" May 10 00:46:03.309281 kubelet[2527]: I0510 00:46:03.309241 2527 scope.go:117] "RemoveContainer" containerID="56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd" May 10 00:46:03.310981 env[1555]: time="2025-05-10T00:46:03.310938636Z" level=info msg="RemoveContainer for \"56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd\"" May 10 00:46:03.317766 env[1555]: time="2025-05-10T00:46:03.317712219Z" level=info msg="RemoveContainer for \"56b2e07cad3418a6edf2aadf144ff9fd6300aed5d67cdbd793294a33d7e486fd\" returns successfully" May 10 00:46:03.318054 kubelet[2527]: I0510 00:46:03.318025 2527 scope.go:117] "RemoveContainer" containerID="7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675" May 10 00:46:03.319558 env[1555]: time="2025-05-10T00:46:03.319509617Z" level=info msg="RemoveContainer for \"7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675\"" May 10 00:46:03.326479 env[1555]: time="2025-05-10T00:46:03.326425118Z" level=info msg="RemoveContainer for \"7d84aa5db9f17497149d3c5d0630d010976cf276c6e33888c6c80153edb98675\" returns successfully" May 10 00:46:03.770816 systemd[1]: run-containerd-runc-k8s.io-c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8-runc.Etygko.mount: Deactivated successfully. May 10 00:46:03.792261 kubelet[2527]: I0510 00:46:03.792223 2527 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="610017dd-5779-4f6a-8bda-ec7df7c6090f" path="/var/lib/kubelet/pods/610017dd-5779-4f6a-8bda-ec7df7c6090f/volumes" May 10 00:46:03.796267 kubelet[2527]: I0510 00:46:03.796033 2527 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a391f88f-8f1f-414e-8d1f-6cd0df0cb271" path="/var/lib/kubelet/pods/a391f88f-8f1f-414e-8d1f-6cd0df0cb271/volumes" May 10 00:46:03.816625 systemd[1]: cri-containerd-5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c.scope: Deactivated successfully. May 10 00:46:03.822000 audit: BPF prog-id=222 op=UNLOAD May 10 00:46:03.854940 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c-rootfs.mount: Deactivated successfully. May 10 00:46:03.895567 env[1555]: time="2025-05-10T00:46:03.895524271Z" level=info msg="shim disconnected" id=5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c May 10 00:46:03.895891 env[1555]: time="2025-05-10T00:46:03.895872119Z" level=warning msg="cleaning up after shim disconnected" id=5624b28f5b004a1cac35ff49f5544c6224acaa461961e060cc696b058330500c namespace=k8s.io May 10 00:46:03.895990 env[1555]: time="2025-05-10T00:46:03.895973577Z" level=info msg="cleaning up dead shim" May 10 00:46:03.912596 env[1555]: time="2025-05-10T00:46:03.912542360Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6174 runtime=io.containerd.runc.v2\n" May 10 00:46:04.308721 env[1555]: time="2025-05-10T00:46:04.308665566Z" level=info msg="CreateContainer within sandbox \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:46:04.336848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2438508750.mount: Deactivated successfully. May 10 00:46:04.339023 env[1555]: time="2025-05-10T00:46:04.338982067Z" level=info msg="CreateContainer within sandbox \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542\"" May 10 00:46:04.339976 env[1555]: time="2025-05-10T00:46:04.339940046Z" level=info msg="StartContainer for \"31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542\"" May 10 00:46:04.414896 systemd[1]: Started cri-containerd-31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542.scope. May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f23b01b1be8 items=0 ppid=6089 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:04.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383535393933616539633633616532363431653530313132373437 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit: BPF prog-id=223 op=LOAD May 10 00:46:04.697000 audit[6194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000349b88 items=0 ppid=6089 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:04.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383535393933616539633633616532363431653530313132373437 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.697000 audit: BPF prog-id=224 op=LOAD May 10 00:46:04.697000 audit[6194]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000349bd8 items=0 ppid=6089 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:04.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383535393933616539633633616532363431653530313132373437 May 10 00:46:04.698000 audit: BPF prog-id=224 op=UNLOAD May 10 00:46:04.698000 audit: BPF prog-id=223 op=UNLOAD May 10 00:46:04.698000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:04.698000 audit: BPF prog-id=225 op=LOAD May 10 00:46:04.698000 audit[6194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000349c68 items=0 ppid=6089 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:04.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331383535393933616539633633616532363431653530313132373437 May 10 00:46:04.743323 env[1555]: time="2025-05-10T00:46:04.743267731Z" level=info msg="StartContainer for \"31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542\" returns successfully" May 10 00:46:05.469333 kernel: kauditd_printk_skb: 194 callbacks suppressed May 10 00:46:05.470157 kernel: audit: type=1325 audit(1746837965.459:1541): table=filter:130 family=2 entries=8 op=nft_register_rule pid=6229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.470244 kernel: audit: type=1300 audit(1746837965.459:1541): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe43a4d3c0 a2=0 a3=7ffe43a4d3ac items=0 ppid=2758 pid=6229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.459000 audit[6229]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=6229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.459000 audit[6229]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe43a4d3c0 a2=0 a3=7ffe43a4d3ac items=0 ppid=2758 pid=6229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.476110 kernel: audit: type=1327 audit(1746837965.459:1541): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.472000 audit[6229]: NETFILTER_CFG table=nat:131 family=2 entries=32 op=nft_register_chain pid=6229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.483679 kernel: audit: type=1325 audit(1746837965.472:1542): table=nat:131 family=2 entries=32 op=nft_register_chain pid=6229 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.472000 audit[6229]: SYSCALL arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7ffe43a4d3c0 a2=0 a3=7ffe43a4d3ac items=0 ppid=2758 pid=6229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.490282 kernel: audit: type=1300 audit(1746837965.472:1542): arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7ffe43a4d3c0 a2=0 a3=7ffe43a4d3ac items=0 ppid=2758 pid=6229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.494128 kernel: audit: type=1327 audit(1746837965.472:1542): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.709000 audit[6231]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=6231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.714104 kernel: audit: type=1325 audit(1746837965.709:1543): table=filter:132 family=2 entries=8 op=nft_register_rule pid=6231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.709000 audit[6231]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeb2045000 a2=0 a3=7ffeb2044fec items=0 ppid=2758 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.726607 kernel: audit: type=1300 audit(1746837965.709:1543): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeb2045000 a2=0 a3=7ffeb2044fec items=0 ppid=2758 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.734112 kernel: audit: type=1327 audit(1746837965.709:1543): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.733000 audit[6231]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=6231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.733000 audit[6231]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeb2045000 a2=0 a3=7ffeb2044fec items=0 ppid=2758 pid=6231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:05.738114 kernel: audit: type=1325 audit(1746837965.733:1544): table=nat:133 family=2 entries=22 op=nft_register_rule pid=6231 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:05.759300 sshd[6001]: pam_unix(sshd:session): session closed for user core May 10 00:46:05.759000 audit[6001]: USER_END pid=6001 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:05.759000 audit[6001]: CRED_DISP pid=6001 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:05.763354 systemd-logind[1540]: Session 20 logged out. Waiting for processes to exit. May 10 00:46:05.765131 systemd[1]: sshd@19-172.31.18.109:22-139.178.89.65:38214.service: Deactivated successfully. May 10 00:46:05.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.109:22-139.178.89.65:38214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:05.766148 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:46:05.767838 systemd-logind[1540]: Removed session 20. May 10 00:46:05.785094 systemd[1]: Started sshd@20-172.31.18.109:22-139.178.89.65:38218.service. May 10 00:46:05.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.109:22-139.178.89.65:38218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:05.975000 audit[6234]: USER_ACCT pid=6234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:05.977014 sshd[6234]: Accepted publickey for core from 139.178.89.65 port 38218 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:05.977000 audit[6234]: CRED_ACQ pid=6234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:05.978000 audit[6234]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd56b405b0 a2=3 a3=0 items=0 ppid=1 pid=6234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:05.978000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:05.981156 sshd[6234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:05.996342 systemd-logind[1540]: New session 21 of user core. May 10 00:46:05.996428 systemd[1]: Started session-21.scope. May 10 00:46:06.006000 audit[6234]: USER_START pid=6234 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:06.008000 audit[6236]: CRED_ACQ pid=6236 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:06.471000 audit: BPF prog-id=126 op=UNLOAD May 10 00:46:06.472709 systemd[1]: cri-containerd-c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5.scope: Deactivated successfully. May 10 00:46:06.478000 audit: BPF prog-id=129 op=UNLOAD May 10 00:46:06.515263 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5-rootfs.mount: Deactivated successfully. May 10 00:46:06.517832 env[1555]: time="2025-05-10T00:46:06.517760621Z" level=info msg="shim disconnected" id=c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5 May 10 00:46:06.517832 env[1555]: time="2025-05-10T00:46:06.517820746Z" level=warning msg="cleaning up after shim disconnected" id=c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5 namespace=k8s.io May 10 00:46:06.517832 env[1555]: time="2025-05-10T00:46:06.517834707Z" level=info msg="cleaning up dead shim" May 10 00:46:06.534928 env[1555]: time="2025-05-10T00:46:06.534867662Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6254 runtime=io.containerd.runc.v2\n" May 10 00:46:06.610469 env[1555]: time="2025-05-10T00:46:06.610402000Z" level=info msg="StopContainer for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" returns successfully" May 10 00:46:06.614027 env[1555]: time="2025-05-10T00:46:06.613990697Z" level=info msg="StopPodSandbox for \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\"" May 10 00:46:06.614200 env[1555]: time="2025-05-10T00:46:06.614051804Z" level=info msg="Container to stop \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:06.616506 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6-shm.mount: Deactivated successfully. May 10 00:46:06.629228 systemd[1]: cri-containerd-ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6.scope: Deactivated successfully. May 10 00:46:06.628000 audit: BPF prog-id=118 op=UNLOAD May 10 00:46:06.632000 audit: BPF prog-id=121 op=UNLOAD May 10 00:46:06.659994 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6-rootfs.mount: Deactivated successfully. May 10 00:46:06.663602 env[1555]: time="2025-05-10T00:46:06.663555461Z" level=info msg="shim disconnected" id=ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6 May 10 00:46:06.663602 env[1555]: time="2025-05-10T00:46:06.663604577Z" level=warning msg="cleaning up after shim disconnected" id=ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6 namespace=k8s.io May 10 00:46:06.663758 env[1555]: time="2025-05-10T00:46:06.663613453Z" level=info msg="cleaning up dead shim" May 10 00:46:06.676192 env[1555]: time="2025-05-10T00:46:06.676125725Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6287 runtime=io.containerd.runc.v2\n" May 10 00:46:06.691837 env[1555]: time="2025-05-10T00:46:06.691794192Z" level=info msg="TearDown network for sandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" successfully" May 10 00:46:06.691837 env[1555]: time="2025-05-10T00:46:06.691832255Z" level=info msg="StopPodSandbox for \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" returns successfully" May 10 00:46:06.807000 audit[6301]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=6301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:06.807000 audit[6301]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd64d5fe70 a2=0 a3=7ffd64d5fe5c items=0 ppid=2758 pid=6301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:06.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:06.819000 audit[6301]: NETFILTER_CFG table=nat:135 family=2 entries=22 op=nft_register_rule pid=6301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:06.819000 audit[6301]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd64d5fe70 a2=0 a3=0 items=0 ppid=2758 pid=6301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:06.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:06.875611 kubelet[2527]: I0510 00:46:06.875513 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wjdfv\" (UniqueName: \"kubernetes.io/projected/739f22c9-7416-4155-8ff6-6e37b0f4434c-kube-api-access-wjdfv\") pod \"739f22c9-7416-4155-8ff6-6e37b0f4434c\" (UID: \"739f22c9-7416-4155-8ff6-6e37b0f4434c\") " May 10 00:46:06.876885 kubelet[2527]: I0510 00:46:06.875716 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/739f22c9-7416-4155-8ff6-6e37b0f4434c-typha-certs\") pod \"739f22c9-7416-4155-8ff6-6e37b0f4434c\" (UID: \"739f22c9-7416-4155-8ff6-6e37b0f4434c\") " May 10 00:46:06.876885 kubelet[2527]: I0510 00:46:06.875769 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/739f22c9-7416-4155-8ff6-6e37b0f4434c-tigera-ca-bundle\") pod \"739f22c9-7416-4155-8ff6-6e37b0f4434c\" (UID: \"739f22c9-7416-4155-8ff6-6e37b0f4434c\") " May 10 00:46:06.913731 systemd[1]: var-lib-kubelet-pods-739f22c9\x2d7416\x2d4155\x2d8ff6\x2d6e37b0f4434c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwjdfv.mount: Deactivated successfully. May 10 00:46:06.928463 systemd[1]: var-lib-kubelet-pods-739f22c9\x2d7416\x2d4155\x2d8ff6\x2d6e37b0f4434c-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 10 00:46:06.936843 kubelet[2527]: I0510 00:46:06.936744 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/739f22c9-7416-4155-8ff6-6e37b0f4434c-kube-api-access-wjdfv" (OuterVolumeSpecName: "kube-api-access-wjdfv") pod "739f22c9-7416-4155-8ff6-6e37b0f4434c" (UID: "739f22c9-7416-4155-8ff6-6e37b0f4434c"). InnerVolumeSpecName "kube-api-access-wjdfv". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:06.948896 kubelet[2527]: I0510 00:46:06.948846 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/739f22c9-7416-4155-8ff6-6e37b0f4434c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "739f22c9-7416-4155-8ff6-6e37b0f4434c" (UID: "739f22c9-7416-4155-8ff6-6e37b0f4434c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:46:06.949495 kubelet[2527]: I0510 00:46:06.949461 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/739f22c9-7416-4155-8ff6-6e37b0f4434c-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "739f22c9-7416-4155-8ff6-6e37b0f4434c" (UID: "739f22c9-7416-4155-8ff6-6e37b0f4434c"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:46:06.977411 kubelet[2527]: I0510 00:46:06.977369 2527 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/739f22c9-7416-4155-8ff6-6e37b0f4434c-tigera-ca-bundle\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:06.977651 kubelet[2527]: I0510 00:46:06.977634 2527 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-wjdfv\" (UniqueName: \"kubernetes.io/projected/739f22c9-7416-4155-8ff6-6e37b0f4434c-kube-api-access-wjdfv\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:06.977756 kubelet[2527]: I0510 00:46:06.977745 2527 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/739f22c9-7416-4155-8ff6-6e37b0f4434c-typha-certs\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:07.237653 sshd[6234]: pam_unix(sshd:session): session closed for user core May 10 00:46:07.237000 audit[6234]: USER_END pid=6234 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.237000 audit[6234]: CRED_DISP pid=6234 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.240178 systemd[1]: sshd@20-172.31.18.109:22-139.178.89.65:38218.service: Deactivated successfully. May 10 00:46:07.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.109:22-139.178.89.65:38218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:07.241213 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:46:07.241881 systemd-logind[1540]: Session 21 logged out. Waiting for processes to exit. May 10 00:46:07.242767 systemd-logind[1540]: Removed session 21. May 10 00:46:07.264454 systemd[1]: Started sshd@21-172.31.18.109:22-139.178.89.65:41238.service. May 10 00:46:07.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.109:22-139.178.89.65:41238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:07.461000 audit[6307]: USER_ACCT pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.463384 sshd[6307]: Accepted publickey for core from 139.178.89.65 port 41238 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:07.463000 audit[6307]: CRED_ACQ pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.464000 audit[6307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd5a5eca0 a2=3 a3=0 items=0 ppid=1 pid=6307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:07.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:07.468021 sshd[6307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:07.479212 systemd-logind[1540]: New session 22 of user core. May 10 00:46:07.480047 systemd[1]: Started session-22.scope. May 10 00:46:07.484000 audit[6307]: USER_START pid=6307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.486000 audit[6309]: CRED_ACQ pid=6309 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.518171 kubelet[2527]: I0510 00:46:07.513183 2527 scope.go:117] "RemoveContainer" containerID="c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5" May 10 00:46:07.518448 systemd[1]: var-lib-kubelet-pods-739f22c9\x2d7416\x2d4155\x2d8ff6\x2d6e37b0f4434c-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 10 00:46:07.571767 systemd[1]: Removed slice kubepods-besteffort-pod739f22c9_7416_4155_8ff6_6e37b0f4434c.slice. May 10 00:46:07.595242 env[1555]: time="2025-05-10T00:46:07.594899892Z" level=info msg="RemoveContainer for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\"" May 10 00:46:07.607421 env[1555]: time="2025-05-10T00:46:07.607280236Z" level=info msg="RemoveContainer for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" returns successfully" May 10 00:46:07.620856 kubelet[2527]: I0510 00:46:07.620824 2527 scope.go:117] "RemoveContainer" containerID="c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5" May 10 00:46:07.621522 env[1555]: time="2025-05-10T00:46:07.621379944Z" level=error msg="ContainerStatus for \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\": not found" May 10 00:46:07.654810 kubelet[2527]: E0510 00:46:07.654751 2527 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\": not found" containerID="c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5" May 10 00:46:07.672059 kubelet[2527]: I0510 00:46:07.672004 2527 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5"} err="failed to get container status \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\": rpc error: code = NotFound desc = an error occurred when try to find container \"c9bb308f06a1127c5f8ae06036bc40adf4c45a6a0efe2946878073442eafaee5\": not found" May 10 00:46:07.802681 kubelet[2527]: I0510 00:46:07.796536 2527 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="739f22c9-7416-4155-8ff6-6e37b0f4434c" path="/var/lib/kubelet/pods/739f22c9-7416-4155-8ff6-6e37b0f4434c/volumes" May 10 00:46:07.920000 audit[6318]: NETFILTER_CFG table=filter:136 family=2 entries=32 op=nft_register_rule pid=6318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:07.920000 audit[6318]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdf0b69770 a2=0 a3=7ffdf0b6975c items=0 ppid=2758 pid=6318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:07.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:07.935000 audit[6318]: NETFILTER_CFG table=nat:137 family=2 entries=30 op=nft_register_rule pid=6318 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:07.935000 audit[6318]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdf0b69770 a2=0 a3=0 items=0 ppid=2758 pid=6318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:07.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:07.976944 sshd[6307]: pam_unix(sshd:session): session closed for user core May 10 00:46:07.977000 audit[6307]: USER_END pid=6307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.977000 audit[6307]: CRED_DISP pid=6307 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:07.982936 systemd-logind[1540]: Session 22 logged out. Waiting for processes to exit. May 10 00:46:07.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.109:22-139.178.89.65:41238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:07.984400 systemd[1]: sshd@21-172.31.18.109:22-139.178.89.65:41238.service: Deactivated successfully. May 10 00:46:07.985388 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:46:07.987922 systemd-logind[1540]: Removed session 22. May 10 00:46:09.161631 systemd[1]: cri-containerd-31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542.scope: Deactivated successfully. May 10 00:46:09.161918 systemd[1]: cri-containerd-31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542.scope: Consumed 1.120s CPU time. May 10 00:46:09.165000 audit: BPF prog-id=225 op=UNLOAD May 10 00:46:09.195694 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542-rootfs.mount: Deactivated successfully. May 10 00:46:09.216676 env[1555]: time="2025-05-10T00:46:09.216601631Z" level=info msg="shim disconnected" id=31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542 May 10 00:46:09.216676 env[1555]: time="2025-05-10T00:46:09.216648888Z" level=warning msg="cleaning up after shim disconnected" id=31855993ae9c63ae2641e501127476278eb532c32d649479738daeffab9ca542 namespace=k8s.io May 10 00:46:09.216676 env[1555]: time="2025-05-10T00:46:09.216658273Z" level=info msg="cleaning up dead shim" May 10 00:46:09.225112 env[1555]: time="2025-05-10T00:46:09.225034871Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6332 runtime=io.containerd.runc.v2\n" May 10 00:46:09.697065 env[1555]: time="2025-05-10T00:46:09.696771161Z" level=info msg="CreateContainer within sandbox \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:46:09.737860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3177810666.mount: Deactivated successfully. May 10 00:46:09.743148 env[1555]: time="2025-05-10T00:46:09.743044002Z" level=info msg="CreateContainer within sandbox \"c49e4a35cc767553f738e7663c6c9174dd8ee52bd1539870677ba875c347c0e8\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa\"" May 10 00:46:09.747359 env[1555]: time="2025-05-10T00:46:09.747310748Z" level=info msg="StartContainer for \"a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa\"" May 10 00:46:09.783111 systemd[1]: Started cri-containerd-a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa.scope. May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f768c416ea8 items=0 ppid=6089 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386334333232623437666532346230393133646566626333373166 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit: BPF prog-id=226 op=LOAD May 10 00:46:09.861000 audit[6354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d7d58 items=0 ppid=6089 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386334333232623437666532346230393133646566626333373166 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit: BPF prog-id=227 op=LOAD May 10 00:46:09.861000 audit[6354]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d7da8 items=0 ppid=6089 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386334333232623437666532346230393133646566626333373166 May 10 00:46:09.861000 audit: BPF prog-id=227 op=UNLOAD May 10 00:46:09.861000 audit: BPF prog-id=226 op=UNLOAD May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { perfmon } for pid=6354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit[6354]: AVC avc: denied { bpf } for pid=6354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:09.861000 audit: BPF prog-id=228 op=LOAD May 10 00:46:09.861000 audit[6354]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002d7e38 items=0 ppid=6089 pid=6354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135386334333232623437666532346230393133646566626333373166 May 10 00:46:09.951176 env[1555]: time="2025-05-10T00:46:09.951044699Z" level=info msg="StartContainer for \"a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa\" returns successfully" May 10 00:46:12.188000 audit[6464]: AVC avc: denied { write } for pid=6464 comm="tee" name="fd" dev="proc" ino=34291 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.192782 kernel: kauditd_printk_skb: 87 callbacks suppressed May 10 00:46:12.195595 kernel: audit: type=1400 audit(1746837972.188:1581): avc: denied { write } for pid=6464 comm="tee" name="fd" dev="proc" ino=34291 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.205000 audit[6468]: AVC avc: denied { write } for pid=6468 comm="tee" name="fd" dev="proc" ino=34294 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.215113 kernel: audit: type=1400 audit(1746837972.205:1582): avc: denied { write } for pid=6468 comm="tee" name="fd" dev="proc" ino=34294 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.188000 audit[6464]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedfafea0d a2=241 a3=1b6 items=1 ppid=6423 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.234175 kernel: audit: type=1300 audit(1746837972.188:1581): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffedfafea0d a2=241 a3=1b6 items=1 ppid=6423 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.188000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:46:12.240647 kernel: audit: type=1307 audit(1746837972.188:1581): cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:46:12.249369 kernel: audit: type=1302 audit(1746837972.188:1581): item=0 name="/dev/fd/63" inode=34285 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.188000 audit: PATH item=0 name="/dev/fd/63" inode=34285 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.188000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.258158 kernel: audit: type=1327 audit(1746837972.188:1581): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.240000 audit[6462]: AVC avc: denied { write } for pid=6462 comm="tee" name="fd" dev="proc" ino=35286 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.269110 kernel: audit: type=1400 audit(1746837972.240:1583): avc: denied { write } for pid=6462 comm="tee" name="fd" dev="proc" ino=35286 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.240000 audit[6462]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd95a63a1c a2=241 a3=1b6 items=1 ppid=6416 pid=6462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.281192 kernel: audit: type=1300 audit(1746837972.240:1583): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd95a63a1c a2=241 a3=1b6 items=1 ppid=6416 pid=6462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.240000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:46:12.292757 kernel: audit: type=1307 audit(1746837972.240:1583): cwd="/etc/service/enabled/bird6/log" May 10 00:46:12.292886 kernel: audit: type=1302 audit(1746837972.240:1583): item=0 name="/dev/fd/63" inode=35273 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.240000 audit: PATH item=0 name="/dev/fd/63" inode=35273 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.240000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.241000 audit[6456]: AVC avc: denied { write } for pid=6456 comm="tee" name="fd" dev="proc" ino=35290 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.241000 audit[6456]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb6443a1c a2=241 a3=1b6 items=1 ppid=6422 pid=6456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.241000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:46:12.241000 audit: PATH item=0 name="/dev/fd/63" inode=35270 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.241000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.256000 audit[6479]: AVC avc: denied { write } for pid=6479 comm="tee" name="fd" dev="proc" ino=35295 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.256000 audit[6479]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7121fa1e a2=241 a3=1b6 items=1 ppid=6414 pid=6479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.256000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:46:12.256000 audit: PATH item=0 name="/dev/fd/63" inode=35280 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.256000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.205000 audit[6468]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff789d0a0c a2=241 a3=1b6 items=1 ppid=6415 pid=6468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.205000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:46:12.205000 audit: PATH item=0 name="/dev/fd/63" inode=34288 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.286000 audit[6476]: AVC avc: denied { write } for pid=6476 comm="tee" name="fd" dev="proc" ino=35300 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.286000 audit[6476]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9c77ba1d a2=241 a3=1b6 items=1 ppid=6411 pid=6476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.286000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:46:12.286000 audit: PATH item=0 name="/dev/fd/63" inode=35277 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.286000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.298000 audit[6484]: AVC avc: denied { write } for pid=6484 comm="tee" name="fd" dev="proc" ino=35304 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:12.298000 audit[6484]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed5d3a1c a2=241 a3=1b6 items=1 ppid=6419 pid=6484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.298000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:46:12.298000 audit: PATH item=0 name="/dev/fd/63" inode=35283 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:12.298000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:12.549000 audit[6492]: NETFILTER_CFG table=filter:138 family=2 entries=20 op=nft_register_rule pid=6492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:12.549000 audit[6492]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffda01c2da0 a2=0 a3=7ffda01c2d8c items=0 ppid=2758 pid=6492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.549000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:12.564000 audit[6492]: NETFILTER_CFG table=nat:139 family=2 entries=106 op=nft_register_chain pid=6492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:12.564000 audit[6492]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffda01c2da0 a2=0 a3=7ffda01c2d8c items=0 ppid=2758 pid=6492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.855000 audit: BPF prog-id=229 op=LOAD May 10 00:46:12.855000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1218f870 a2=98 a3=3 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.855000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.855000 audit: BPF prog-id=229 op=UNLOAD May 10 00:46:12.857000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.857000 audit: BPF prog-id=230 op=LOAD May 10 00:46:12.857000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1218f650 a2=74 a3=540051 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.858000 audit: BPF prog-id=230 op=UNLOAD May 10 00:46:12.858000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.858000 audit: BPF prog-id=231 op=LOAD May 10 00:46:12.858000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1218f680 a2=94 a3=2 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.858000 audit: BPF prog-id=231 op=UNLOAD May 10 00:46:12.977000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit: BPF prog-id=232 op=LOAD May 10 00:46:12.977000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1218f540 a2=40 a3=1 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.977000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.977000 audit: BPF prog-id=232 op=UNLOAD May 10 00:46:12.977000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.977000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd1218f610 a2=50 a3=7ffd1218f6f0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.977000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1218f550 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1218f580 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1218f490 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1218f5a0 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1218f580 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1218f570 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1218f5a0 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1218f580 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1218f5a0 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd1218f570 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.990000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.990000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1218f5e0 a2=28 a3=0 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.990000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1218f390 a2=50 a3=1 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit: BPF prog-id=233 op=LOAD May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd1218f390 a2=94 a3=5 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit: BPF prog-id=233 op=UNLOAD May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd1218f440 a2=50 a3=1 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd1218f560 a2=4 a3=38 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { confidentiality } for pid=6525 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1218f5b0 a2=94 a3=6 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { confidentiality } for pid=6525 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1218ed60 a2=94 a3=83 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { perfmon } for pid=6525 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { bpf } for pid=6525 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:12.991000 audit[6525]: AVC avc: denied { confidentiality } for pid=6525 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:12.991000 audit[6525]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd1218ed60 a2=94 a3=83 items=0 ppid=6426 pid=6525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.991000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:13.029126 systemd[1]: Started sshd@22-172.31.18.109:22-139.178.89.65:41254.service. May 10 00:46:13.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.109:22-139.178.89.65:41254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit: BPF prog-id=234 op=LOAD May 10 00:46:13.059000 audit[6530]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc28540960 a2=98 a3=1999999999999999 items=0 ppid=6426 pid=6530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.059000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:13.059000 audit: BPF prog-id=234 op=UNLOAD May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit: BPF prog-id=235 op=LOAD May 10 00:46:13.059000 audit[6530]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc28540840 a2=74 a3=ffff items=0 ppid=6426 pid=6530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.059000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:13.059000 audit: BPF prog-id=235 op=UNLOAD May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { perfmon } for pid=6530 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit[6530]: AVC avc: denied { bpf } for pid=6530 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.059000 audit: BPF prog-id=236 op=LOAD May 10 00:46:13.059000 audit[6530]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc28540880 a2=40 a3=7ffc28540a60 items=0 ppid=6426 pid=6530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.059000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:13.059000 audit: BPF prog-id=236 op=UNLOAD May 10 00:46:13.207000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.207000 audit: BPF prog-id=237 op=LOAD May 10 00:46:13.207000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee36ba870 a2=98 a3=ffffffff items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.207000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.209000 audit: BPF prog-id=237 op=UNLOAD May 10 00:46:13.210000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.210000 audit: BPF prog-id=238 op=LOAD May 10 00:46:13.210000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee36ba680 a2=74 a3=540051 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.210000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.211000 audit: BPF prog-id=238 op=UNLOAD May 10 00:46:13.211000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.211000 audit: BPF prog-id=239 op=LOAD May 10 00:46:13.211000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee36ba6b0 a2=94 a3=2 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.211000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit: BPF prog-id=239 op=UNLOAD May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee36ba580 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee36ba5b0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee36ba4c0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee36ba5d0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee36ba5b0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee36ba5a0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee36ba5d0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee36ba5b0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee36ba5d0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee36ba5a0 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee36ba610 a2=28 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.214000 audit: BPF prog-id=240 op=LOAD May 10 00:46:13.214000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee36ba480 a2=40 a3=0 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.214000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.214000 audit: BPF prog-id=240 op=UNLOAD May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffee36ba470 a2=50 a3=2800 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffee36ba470 a2=50 a3=2800 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit: BPF prog-id=241 op=LOAD May 10 00:46:13.216000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee36b9c90 a2=94 a3=2 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.216000 audit: BPF prog-id=241 op=UNLOAD May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { perfmon } for pid=6555 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit[6555]: AVC avc: denied { bpf } for pid=6555 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.216000 audit: BPF prog-id=242 op=LOAD May 10 00:46:13.216000 audit[6555]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee36b9d90 a2=94 a3=30 items=0 ppid=6426 pid=6555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:13.225807 (udev-worker)[6558]: Network interface NamePolicy= disabled on kernel command line. May 10 00:46:13.225820 (udev-worker)[6557]: Network interface NamePolicy= disabled on kernel command line. May 10 00:46:13.226000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.226000 audit: BPF prog-id=243 op=LOAD May 10 00:46:13.226000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff86de38d0 a2=98 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.226000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.226000 audit: BPF prog-id=243 op=UNLOAD May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit: BPF prog-id=244 op=LOAD May 10 00:46:13.227000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff86de36b0 a2=74 a3=540051 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.227000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.227000 audit: BPF prog-id=244 op=UNLOAD May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.227000 audit: BPF prog-id=245 op=LOAD May 10 00:46:13.227000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff86de36e0 a2=94 a3=2 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.227000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.227000 audit: BPF prog-id=245 op=UNLOAD May 10 00:46:13.301000 audit[6529]: USER_ACCT pid=6529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:13.303000 audit[6529]: CRED_ACQ pid=6529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:13.303000 audit[6529]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8f8adbd0 a2=3 a3=0 items=0 ppid=1 pid=6529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.303000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:13.312854 sshd[6529]: Accepted publickey for core from 139.178.89.65 port 41254 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:13.311036 sshd[6529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:13.326088 systemd[1]: Started session-23.scope. May 10 00:46:13.327145 systemd-logind[1540]: New session 23 of user core. May 10 00:46:13.334000 audit[6529]: USER_START pid=6529 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:13.336000 audit[6566]: CRED_ACQ pid=6566 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:13.403000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.403000 audit: BPF prog-id=246 op=LOAD May 10 00:46:13.403000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff86de35a0 a2=40 a3=1 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.403000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.404000 audit: BPF prog-id=246 op=UNLOAD May 10 00:46:13.404000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.404000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff86de3670 a2=50 a3=7fff86de3750 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.404000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.424000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.424000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff86de35b0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.424000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.425000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.425000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff86de35e0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.425000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.425000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.425000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff86de34f0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.425000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.425000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.425000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff86de3600 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.425000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.426000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.426000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff86de35e0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.426000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.426000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.426000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff86de35d0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.426000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.426000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.426000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff86de3600 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.426000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.426000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.426000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff86de35e0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.426000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.427000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.427000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff86de3600 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.427000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.427000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff86de35d0 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.427000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.427000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff86de3640 a2=28 a3=0 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff86de33f0 a2=50 a3=1 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.428000 audit: BPF prog-id=247 op=LOAD May 10 00:46:13.428000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff86de33f0 a2=94 a3=5 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.428000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.429000 audit: BPF prog-id=247 op=UNLOAD May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff86de34a0 a2=50 a3=1 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff86de35c0 a2=4 a3=38 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.429000 audit[6561]: AVC avc: denied { confidentiality } for pid=6561 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:13.429000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff86de3610 a2=94 a3=6 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.429000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.430000 audit[6561]: AVC avc: denied { confidentiality } for pid=6561 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:13.430000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff86de2dc0 a2=94 a3=83 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.430000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { perfmon } for pid=6561 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.432000 audit[6561]: AVC avc: denied { confidentiality } for pid=6561 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:13.432000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff86de2dc0 a2=94 a3=83 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.432000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.433000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.433000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff86de4800 a2=10 a3=f1f00800 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.433000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.433000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff86de46a0 a2=10 a3=3 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.433000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.433000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff86de4640 a2=10 a3=3 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.433000 audit[6561]: AVC avc: denied { bpf } for pid=6561 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:13.433000 audit[6561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff86de4640 a2=10 a3=7 items=0 ppid=6426 pid=6561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:13.444000 audit: BPF prog-id=242 op=UNLOAD May 10 00:46:14.432762 sshd[6529]: pam_unix(sshd:session): session closed for user core May 10 00:46:14.433000 audit[6529]: USER_END pid=6529 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:14.433000 audit[6529]: CRED_DISP pid=6529 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:14.436886 systemd[1]: sshd@22-172.31.18.109:22-139.178.89.65:41254.service: Deactivated successfully. May 10 00:46:14.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.109:22-139.178.89.65:41254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:14.437490 systemd-logind[1540]: Session 23 logged out. Waiting for processes to exit. May 10 00:46:14.438343 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:46:14.439563 systemd-logind[1540]: Removed session 23. May 10 00:46:19.460193 systemd[1]: Started sshd@23-172.31.18.109:22-139.178.89.65:58496.service. May 10 00:46:19.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.109:22-139.178.89.65:58496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:19.467985 kernel: kauditd_printk_skb: 510 callbacks suppressed May 10 00:46:19.468115 kernel: audit: type=1130 audit(1746837979.459:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.109:22-139.178.89.65:58496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:19.644000 audit[6620]: USER_ACCT pid=6620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.653882 sshd[6620]: Accepted publickey for core from 139.178.89.65 port 58496 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:19.654243 kernel: audit: type=1101 audit(1746837979.644:1691): pid=6620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.653000 audit[6620]: CRED_ACQ pid=6620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.657828 sshd[6620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:19.666130 kernel: audit: type=1103 audit(1746837979.653:1692): pid=6620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.666223 kernel: audit: type=1006 audit(1746837979.653:1693): pid=6620 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:46:19.666248 kernel: audit: type=1300 audit(1746837979.653:1693): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19dc2c20 a2=3 a3=0 items=0 ppid=1 pid=6620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.653000 audit[6620]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff19dc2c20 a2=3 a3=0 items=0 ppid=1 pid=6620 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:19.665795 systemd[1]: Started session-24.scope. May 10 00:46:19.667679 systemd-logind[1540]: New session 24 of user core. May 10 00:46:19.653000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:19.677074 kernel: audit: type=1327 audit(1746837979.653:1693): proctitle=737368643A20636F7265205B707269765D May 10 00:46:19.671000 audit[6620]: USER_START pid=6620 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.687135 kernel: audit: type=1105 audit(1746837979.671:1694): pid=6620 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.687266 kernel: audit: type=1103 audit(1746837979.673:1695): pid=6622 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.673000 audit[6622]: CRED_ACQ pid=6622 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.937187 sshd[6620]: pam_unix(sshd:session): session closed for user core May 10 00:46:19.937000 audit[6620]: USER_END pid=6620 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.940247 systemd[1]: sshd@23-172.31.18.109:22-139.178.89.65:58496.service: Deactivated successfully. May 10 00:46:19.940956 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:46:19.943055 systemd-logind[1540]: Session 24 logged out. Waiting for processes to exit. May 10 00:46:19.944263 systemd-logind[1540]: Removed session 24. May 10 00:46:19.937000 audit[6620]: CRED_DISP pid=6620 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.953708 kernel: audit: type=1106 audit(1746837979.937:1696): pid=6620 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.953837 kernel: audit: type=1104 audit(1746837979.937:1697): pid=6620 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:19.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.109:22-139.178.89.65:58496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:21.334000 audit[6633]: NETFILTER_CFG table=filter:140 family=2 entries=8 op=nft_register_rule pid=6633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.334000 audit[6633]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd117991b0 a2=0 a3=7ffd1179919c items=0 ppid=2758 pid=6633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.348000 audit[6633]: NETFILTER_CFG table=nat:141 family=2 entries=64 op=nft_register_chain pid=6633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.348000 audit[6633]: SYSCALL arch=c000003e syscall=46 success=yes exit=22340 a0=3 a1=7ffd117991b0 a2=0 a3=7ffd1179919c items=0 ppid=2758 pid=6633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.367000 audit[6635]: NETFILTER_CFG table=filter:142 family=2 entries=8 op=nft_register_rule pid=6635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.367000 audit[6635]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff7e3e90c0 a2=0 a3=7fff7e3e90ac items=0 ppid=2758 pid=6635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.374257 kubelet[2527]: I0510 00:46:21.362050 2527 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-59zhr" podStartSLOduration=19.343490511 podStartE2EDuration="19.343490511s" podCreationTimestamp="2025-05-10 00:46:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:10.640594705 +0000 UTC m=+86.989314883" watchObservedRunningTime="2025-05-10 00:46:21.343490511 +0000 UTC m=+97.692210671" May 10 00:46:21.374000 audit[6635]: NETFILTER_CFG table=nat:143 family=2 entries=64 op=nft_unregister_chain pid=6635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.374000 audit[6635]: SYSCALL arch=c000003e syscall=46 success=yes exit=20580 a0=3 a1=7fff7e3e90c0 a2=0 a3=7fff7e3e90ac items=0 ppid=2758 pid=6635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.462202 env[1555]: time="2025-05-10T00:46:21.462163945Z" level=info msg="StopContainer for \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\" with timeout 30 (s)" May 10 00:46:21.463460 env[1555]: time="2025-05-10T00:46:21.463428898Z" level=info msg="Stop container \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\" with signal terminated" May 10 00:46:21.485658 systemd[1]: cri-containerd-b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8.scope: Deactivated successfully. May 10 00:46:21.484000 audit: BPF prog-id=208 op=UNLOAD May 10 00:46:21.488000 audit: BPF prog-id=211 op=UNLOAD May 10 00:46:21.526294 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8-rootfs.mount: Deactivated successfully. May 10 00:46:21.541460 env[1555]: time="2025-05-10T00:46:21.541337913Z" level=info msg="shim disconnected" id=b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8 May 10 00:46:21.541840 env[1555]: time="2025-05-10T00:46:21.541801317Z" level=warning msg="cleaning up after shim disconnected" id=b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8 namespace=k8s.io May 10 00:46:21.541840 env[1555]: time="2025-05-10T00:46:21.541828249Z" level=info msg="cleaning up dead shim" May 10 00:46:21.552384 env[1555]: time="2025-05-10T00:46:21.552337618Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6654 runtime=io.containerd.runc.v2\n" May 10 00:46:21.558576 env[1555]: time="2025-05-10T00:46:21.558529366Z" level=info msg="StopContainer for \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\" returns successfully" May 10 00:46:21.562900 env[1555]: time="2025-05-10T00:46:21.562865530Z" level=info msg="StopPodSandbox for \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\"" May 10 00:46:21.563383 env[1555]: time="2025-05-10T00:46:21.563360640Z" level=info msg="Container to stop \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:21.566114 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d-shm.mount: Deactivated successfully. May 10 00:46:21.574521 systemd[1]: cri-containerd-d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d.scope: Deactivated successfully. May 10 00:46:21.573000 audit: BPF prog-id=173 op=UNLOAD May 10 00:46:21.577000 audit: BPF prog-id=176 op=UNLOAD May 10 00:46:21.600394 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d-rootfs.mount: Deactivated successfully. May 10 00:46:21.617215 env[1555]: time="2025-05-10T00:46:21.617173993Z" level=info msg="shim disconnected" id=d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d May 10 00:46:21.617667 env[1555]: time="2025-05-10T00:46:21.617645633Z" level=warning msg="cleaning up after shim disconnected" id=d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d namespace=k8s.io May 10 00:46:21.617828 env[1555]: time="2025-05-10T00:46:21.617787656Z" level=info msg="cleaning up dead shim" May 10 00:46:21.627974 env[1555]: time="2025-05-10T00:46:21.627915641Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6683 runtime=io.containerd.runc.v2\n" May 10 00:46:22.143615 systemd-networkd[1276]: cali8b65e917725: Link DOWN May 10 00:46:22.143624 systemd-networkd[1276]: cali8b65e917725: Lost carrier May 10 00:46:22.164000 audit[6723]: NETFILTER_CFG table=filter:144 family=2 entries=44 op=nft_register_rule pid=6723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:22.164000 audit[6723]: SYSCALL arch=c000003e syscall=46 success=yes exit=6584 a0=3 a1=7ffd1d572de0 a2=0 a3=7ffd1d572dcc items=0 ppid=6426 pid=6723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.164000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:22.165000 audit[6723]: NETFILTER_CFG table=filter:145 family=2 entries=2 op=nft_unregister_chain pid=6723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:22.165000 audit[6723]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd1d572de0 a2=0 a3=558174491000 items=0 ppid=6426 pid=6723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.165000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:22.584194 kubelet[2527]: I0510 00:46:22.584152 2527 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.133 [INFO][6709] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.138 [INFO][6709] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" iface="eth0" netns="/var/run/netns/cni-34ace56d-93ef-6e1a-dcff-1a7afc07e82c" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.139 [INFO][6709] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" iface="eth0" netns="/var/run/netns/cni-34ace56d-93ef-6e1a-dcff-1a7afc07e82c" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.158 [INFO][6709] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" after=20.018113ms iface="eth0" netns="/var/run/netns/cni-34ace56d-93ef-6e1a-dcff-1a7afc07e82c" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.158 [INFO][6709] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.158 [INFO][6709] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.586 [INFO][6722] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.590 [INFO][6722] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.591 [INFO][6722] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.734 [INFO][6722] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.734 [INFO][6722] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.749 [INFO][6722] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:22.754904 env[1555]: 2025-05-10 00:46:22.752 [INFO][6709] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:22.760321 systemd[1]: run-netns-cni\x2d34ace56d\x2d93ef\x2d6e1a\x2ddcff\x2d1a7afc07e82c.mount: Deactivated successfully. May 10 00:46:22.761809 env[1555]: time="2025-05-10T00:46:22.761765054Z" level=info msg="TearDown network for sandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" successfully" May 10 00:46:22.761940 env[1555]: time="2025-05-10T00:46:22.761920469Z" level=info msg="StopPodSandbox for \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" returns successfully" May 10 00:46:22.916117 kubelet[2527]: I0510 00:46:22.915992 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-calico-apiserver-certs\") pod \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\" (UID: \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\") " May 10 00:46:22.916363 kubelet[2527]: I0510 00:46:22.916345 2527 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-mbr66\" (UniqueName: \"kubernetes.io/projected/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-kube-api-access-mbr66\") pod \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\" (UID: \"79ddf9c0-41ca-4fb7-aa65-dc07e519acd4\") " May 10 00:46:23.020971 systemd[1]: var-lib-kubelet-pods-79ddf9c0\x2d41ca\x2d4fb7\x2daa65\x2ddc07e519acd4-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dmbr66.mount: Deactivated successfully. May 10 00:46:23.022683 systemd[1]: var-lib-kubelet-pods-79ddf9c0\x2d41ca\x2d4fb7\x2daa65\x2ddc07e519acd4-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:46:23.027844 kubelet[2527]: I0510 00:46:23.023213 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-kube-api-access-mbr66" (OuterVolumeSpecName: "kube-api-access-mbr66") pod "79ddf9c0-41ca-4fb7-aa65-dc07e519acd4" (UID: "79ddf9c0-41ca-4fb7-aa65-dc07e519acd4"). InnerVolumeSpecName "kube-api-access-mbr66". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:23.028049 kubelet[2527]: I0510 00:46:23.025062 2527 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "79ddf9c0-41ca-4fb7-aa65-dc07e519acd4" (UID: "79ddf9c0-41ca-4fb7-aa65-dc07e519acd4"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:46:23.028000 audit[6732]: NETFILTER_CFG table=filter:146 family=2 entries=8 op=nft_register_rule pid=6732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:23.028000 audit[6732]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffc0448ac0 a2=0 a3=7fffc0448aac items=0 ppid=2758 pid=6732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.034000 audit[6732]: NETFILTER_CFG table=nat:147 family=2 entries=60 op=nft_register_rule pid=6732 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:23.034000 audit[6732]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7fffc0448ac0 a2=0 a3=7fffc0448aac items=0 ppid=2758 pid=6732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.056736 kubelet[2527]: I0510 00:46:23.056705 2527 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-calico-apiserver-certs\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:23.056950 kubelet[2527]: I0510 00:46:23.056932 2527 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-mbr66\" (UniqueName: \"kubernetes.io/projected/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4-kube-api-access-mbr66\") on node \"ip-172-31-18-109\" DevicePath \"\"" May 10 00:46:23.611152 systemd[1]: Removed slice kubepods-besteffort-pod79ddf9c0_41ca_4fb7_aa65_dc07e519acd4.slice. May 10 00:46:23.799732 kubelet[2527]: I0510 00:46:23.799684 2527 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="79ddf9c0-41ca-4fb7-aa65-dc07e519acd4" path="/var/lib/kubelet/pods/79ddf9c0-41ca-4fb7-aa65-dc07e519acd4/volumes" May 10 00:46:24.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.109:22-139.178.89.65:58500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:24.966043 kernel: kauditd_printk_skb: 29 callbacks suppressed May 10 00:46:24.966168 kernel: audit: type=1130 audit(1746837984.962:1711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.109:22-139.178.89.65:58500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:24.963578 systemd[1]: Started sshd@24-172.31.18.109:22-139.178.89.65:58500.service. May 10 00:46:25.223000 audit[6740]: USER_ACCT pid=6740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.229425 sshd[6740]: Accepted publickey for core from 139.178.89.65 port 58500 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:25.230220 kernel: audit: type=1101 audit(1746837985.223:1712): pid=6740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.230000 audit[6740]: CRED_ACQ pid=6740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.235743 sshd[6740]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:25.238323 kernel: audit: type=1103 audit(1746837985.230:1713): pid=6740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.230000 audit[6740]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe88ad190 a2=3 a3=0 items=0 ppid=1 pid=6740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.247320 kernel: audit: type=1006 audit(1746837985.230:1714): pid=6740 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:46:25.249225 kernel: audit: type=1300 audit(1746837985.230:1714): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe88ad190 a2=3 a3=0 items=0 ppid=1 pid=6740 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.250227 kernel: audit: type=1327 audit(1746837985.230:1714): proctitle=737368643A20636F7265205B707269765D May 10 00:46:25.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:25.253751 systemd-logind[1540]: New session 25 of user core. May 10 00:46:25.255316 systemd[1]: Started session-25.scope. May 10 00:46:25.267000 audit[6740]: USER_START pid=6740 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.279116 kernel: audit: type=1105 audit(1746837985.267:1715): pid=6740 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.279000 audit[6742]: CRED_ACQ pid=6742 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.287911 kernel: audit: type=1103 audit(1746837985.279:1716): pid=6742 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.667751 sshd[6740]: pam_unix(sshd:session): session closed for user core May 10 00:46:25.668000 audit[6740]: USER_END pid=6740 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.682647 kernel: audit: type=1106 audit(1746837985.668:1717): pid=6740 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.684327 systemd[1]: sshd@24-172.31.18.109:22-139.178.89.65:58500.service: Deactivated successfully. May 10 00:46:25.685404 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:46:25.686433 systemd-logind[1540]: Session 25 logged out. Waiting for processes to exit. May 10 00:46:25.668000 audit[6740]: CRED_DISP pid=6740 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.688159 systemd-logind[1540]: Removed session 25. May 10 00:46:25.697121 kernel: audit: type=1104 audit(1746837985.668:1718): pid=6740 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:25.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.109:22-139.178.89.65:58500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:30.705737 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:30.705891 kernel: audit: type=1130 audit(1746837990.693:1720): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.109:22-139.178.89.65:59490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:30.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.109:22-139.178.89.65:59490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:30.694657 systemd[1]: Started sshd@25-172.31.18.109:22-139.178.89.65:59490.service. May 10 00:46:30.858000 audit[6755]: USER_ACCT pid=6755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.861138 sshd[6755]: Accepted publickey for core from 139.178.89.65 port 59490 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:30.869000 audit[6755]: CRED_ACQ pid=6755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.870595 sshd[6755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:30.878000 systemd[1]: Started session-26.scope. May 10 00:46:30.879261 kernel: audit: type=1101 audit(1746837990.858:1721): pid=6755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.879355 kernel: audit: type=1103 audit(1746837990.869:1722): pid=6755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.879392 kernel: audit: type=1006 audit(1746837990.869:1723): pid=6755 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:46:30.879486 systemd-logind[1540]: New session 26 of user core. May 10 00:46:30.869000 audit[6755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfb8148f0 a2=3 a3=0 items=0 ppid=1 pid=6755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.899791 kernel: audit: type=1300 audit(1746837990.869:1723): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfb8148f0 a2=3 a3=0 items=0 ppid=1 pid=6755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:30.899910 kernel: audit: type=1327 audit(1746837990.869:1723): proctitle=737368643A20636F7265205B707269765D May 10 00:46:30.899940 kernel: audit: type=1105 audit(1746837990.884:1724): pid=6755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.869000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:30.884000 audit[6755]: USER_START pid=6755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.889000 audit[6757]: CRED_ACQ pid=6757 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:30.917121 kernel: audit: type=1103 audit(1746837990.889:1725): pid=6757 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:31.234122 sshd[6755]: pam_unix(sshd:session): session closed for user core May 10 00:46:31.235000 audit[6755]: USER_END pid=6755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:31.244602 systemd[1]: sshd@25-172.31.18.109:22-139.178.89.65:59490.service: Deactivated successfully. May 10 00:46:31.247153 kernel: audit: type=1106 audit(1746837991.235:1726): pid=6755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:31.246932 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:46:31.241000 audit[6755]: CRED_DISP pid=6755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:31.248626 systemd-logind[1540]: Session 26 logged out. Waiting for processes to exit. May 10 00:46:31.250413 systemd-logind[1540]: Removed session 26. May 10 00:46:31.256187 kernel: audit: type=1104 audit(1746837991.241:1727): pid=6755 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:31.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.109:22-139.178.89.65:59490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:36.262417 systemd[1]: Started sshd@26-172.31.18.109:22-139.178.89.65:59504.service. May 10 00:46:36.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.18.109:22-139.178.89.65:59504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:36.266195 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:36.266740 kernel: audit: type=1130 audit(1746837996.262:1729): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.18.109:22-139.178.89.65:59504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:36.459000 audit[6817]: USER_ACCT pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.467166 sshd[6817]: Accepted publickey for core from 139.178.89.65 port 59504 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:36.470115 kernel: audit: type=1101 audit(1746837996.459:1730): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.470000 audit[6817]: CRED_ACQ pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.478508 sshd[6817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:36.484741 kernel: audit: type=1103 audit(1746837996.470:1731): pid=6817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.485596 kernel: audit: type=1006 audit(1746837996.470:1732): pid=6817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:46:36.485662 kernel: audit: type=1300 audit(1746837996.470:1732): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ba7a820 a2=3 a3=0 items=0 ppid=1 pid=6817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.470000 audit[6817]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ba7a820 a2=3 a3=0 items=0 ppid=1 pid=6817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:36.491149 systemd[1]: Started session-27.scope. May 10 00:46:36.503535 kernel: audit: type=1327 audit(1746837996.470:1732): proctitle=737368643A20636F7265205B707269765D May 10 00:46:36.470000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:36.499845 systemd-logind[1540]: New session 27 of user core. May 10 00:46:36.513000 audit[6817]: USER_START pid=6817 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.524147 kernel: audit: type=1105 audit(1746837996.513:1733): pid=6817 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.527000 audit[6820]: CRED_ACQ pid=6820 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.536106 kernel: audit: type=1103 audit(1746837996.527:1734): pid=6820 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.931926 sshd[6817]: pam_unix(sshd:session): session closed for user core May 10 00:46:36.932000 audit[6817]: USER_END pid=6817 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.942100 kernel: audit: type=1106 audit(1746837996.932:1735): pid=6817 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.942755 systemd-logind[1540]: Session 27 logged out. Waiting for processes to exit. May 10 00:46:36.943122 systemd[1]: sshd@26-172.31.18.109:22-139.178.89.65:59504.service: Deactivated successfully. May 10 00:46:36.943841 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:46:36.933000 audit[6817]: CRED_DISP pid=6817 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:36.945302 systemd-logind[1540]: Removed session 27. May 10 00:46:36.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.18.109:22-139.178.89.65:59504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:36.951480 kernel: audit: type=1104 audit(1746837996.933:1736): pid=6817 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:38.564000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:38.564000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:38.564000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0039f9b30 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:46:38.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:38.564000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00395d580 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:46:38.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:38.597000 audit[5087]: AVC avc: denied { watch } for pid=5087 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_16.3311537486/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c415,c621 tclass=file permissive=0 May 10 00:46:38.597000 audit[5087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001a496e0 a2=fc6 a3=0 items=0 ppid=4473 pid=5087 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 key=(null) May 10 00:46:38.597000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:39.658000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:39.658000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0097debe0 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:46:39.658000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:46:39.658000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:39.658000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00968b800 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:46:39.658000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:46:39.659000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:39.659000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00968b830 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:46:39.659000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:46:39.662000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:39.662000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00a357920 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:46:39.662000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:46:39.732000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:39.732000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009c5c000 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:46:39.732000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:46:39.732000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:39.732000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009a51e00 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:46:39.732000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:46:41.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.109:22-139.178.89.65:52080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:41.958897 systemd[1]: Started sshd@27-172.31.18.109:22-139.178.89.65:52080.service. May 10 00:46:41.960786 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 00:46:41.960878 kernel: audit: type=1130 audit(1746838001.958:1747): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.109:22-139.178.89.65:52080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.164000 audit[6830]: USER_ACCT pid=6830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.173226 kernel: audit: type=1101 audit(1746838002.164:1748): pid=6830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.173272 sshd[6830]: Accepted publickey for core from 139.178.89.65 port 52080 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:42.172000 audit[6830]: CRED_ACQ pid=6830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.177762 sshd[6830]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:42.181151 kernel: audit: type=1103 audit(1746838002.172:1749): pid=6830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.186027 systemd[1]: Started session-28.scope. May 10 00:46:42.186949 systemd-logind[1540]: New session 28 of user core. May 10 00:46:42.172000 audit[6830]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb21b3b90 a2=3 a3=0 items=0 ppid=1 pid=6830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.199425 kernel: audit: type=1006 audit(1746838002.172:1750): pid=6830 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 10 00:46:42.199534 kernel: audit: type=1300 audit(1746838002.172:1750): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb21b3b90 a2=3 a3=0 items=0 ppid=1 pid=6830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:42.172000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.208105 kernel: audit: type=1327 audit(1746838002.172:1750): proctitle=737368643A20636F7265205B707269765D May 10 00:46:42.198000 audit[6830]: USER_START pid=6830 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.221312 kernel: audit: type=1105 audit(1746838002.198:1751): pid=6830 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.204000 audit[6834]: CRED_ACQ pid=6834 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.232158 kernel: audit: type=1103 audit(1746838002.204:1752): pid=6834 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.489644 sshd[6830]: pam_unix(sshd:session): session closed for user core May 10 00:46:42.491000 audit[6830]: USER_END pid=6830 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.492000 audit[6830]: CRED_DISP pid=6830 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.503622 systemd[1]: sshd@27-172.31.18.109:22-139.178.89.65:52080.service: Deactivated successfully. May 10 00:46:42.504406 systemd[1]: session-28.scope: Deactivated successfully. May 10 00:46:42.505941 systemd-logind[1540]: Session 28 logged out. Waiting for processes to exit. May 10 00:46:42.506953 kernel: audit: type=1106 audit(1746838002.491:1753): pid=6830 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.507044 kernel: audit: type=1104 audit(1746838002.492:1754): pid=6830 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:42.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.109:22-139.178.89.65:52080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:42.507365 systemd-logind[1540]: Removed session 28. May 10 00:46:46.515096 kubelet[2527]: I0510 00:46:46.515034 2527 scope.go:117] "RemoveContainer" containerID="bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d" May 10 00:46:46.517851 env[1555]: time="2025-05-10T00:46:46.517811463Z" level=info msg="RemoveContainer for \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\"" May 10 00:46:46.525706 env[1555]: time="2025-05-10T00:46:46.525648007Z" level=info msg="RemoveContainer for \"bfdd5efe96a71ffa4b091b087ccada7102f9205a6dfe37cad32062dcc907428d\" returns successfully" May 10 00:46:46.525912 kubelet[2527]: I0510 00:46:46.525885 2527 scope.go:117] "RemoveContainer" containerID="b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8" May 10 00:46:46.527098 env[1555]: time="2025-05-10T00:46:46.527045421Z" level=info msg="RemoveContainer for \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\"" May 10 00:46:46.533410 env[1555]: time="2025-05-10T00:46:46.533363992Z" level=info msg="RemoveContainer for \"b9ffbac9d1c03135ea1e25f8c34fa19adfb33060fa477829ef3e30e9c6aea7e8\" returns successfully" May 10 00:46:46.534824 env[1555]: time="2025-05-10T00:46:46.534789164Z" level=info msg="StopPodSandbox for \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\"" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:46.772 [WARNING][6858] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:46.778 [INFO][6858] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:46.778 [INFO][6858] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" iface="eth0" netns="" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:46.778 [INFO][6858] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:46.778 [INFO][6858] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.085 [INFO][6865] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.085 [INFO][6865] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.085 [INFO][6865] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.092 [WARNING][6865] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.093 [INFO][6865] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.094 [INFO][6865] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.098707 env[1555]: 2025-05-10 00:46:47.096 [INFO][6858] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.100070 env[1555]: time="2025-05-10T00:46:47.098724665Z" level=info msg="TearDown network for sandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" successfully" May 10 00:46:47.100070 env[1555]: time="2025-05-10T00:46:47.098755466Z" level=info msg="StopPodSandbox for \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" returns successfully" May 10 00:46:47.100070 env[1555]: time="2025-05-10T00:46:47.099202052Z" level=info msg="RemovePodSandbox for \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\"" May 10 00:46:47.100070 env[1555]: time="2025-05-10T00:46:47.099232763Z" level=info msg="Forcibly stopping sandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\"" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.151 [WARNING][6884] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.152 [INFO][6884] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.152 [INFO][6884] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" iface="eth0" netns="" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.152 [INFO][6884] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.152 [INFO][6884] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.176 [INFO][6891] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.176 [INFO][6891] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.176 [INFO][6891] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.183 [WARNING][6891] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.183 [INFO][6891] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" HandleID="k8s-pod-network.4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" Workload="ip--172--31--18--109-k8s-calico--kube--controllers--86bf69bcdf--7tmvh-eth0" May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.185 [INFO][6891] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.189539 env[1555]: 2025-05-10 00:46:47.187 [INFO][6884] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394" May 10 00:46:47.189999 env[1555]: time="2025-05-10T00:46:47.189566954Z" level=info msg="TearDown network for sandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" successfully" May 10 00:46:47.197224 env[1555]: time="2025-05-10T00:46:47.197170134Z" level=info msg="RemovePodSandbox \"4631cb71778f9e917605c5c6280b2a8dbd4e2b5719f5df857e7474c7dd45a394\" returns successfully" May 10 00:46:47.197786 env[1555]: time="2025-05-10T00:46:47.197753972Z" level=info msg="StopPodSandbox for \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\"" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.238 [WARNING][6909] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.238 [INFO][6909] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.238 [INFO][6909] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" iface="eth0" netns="" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.238 [INFO][6909] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.239 [INFO][6909] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.261 [INFO][6916] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.261 [INFO][6916] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.261 [INFO][6916] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.269 [WARNING][6916] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.269 [INFO][6916] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.271 [INFO][6916] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.275200 env[1555]: 2025-05-10 00:46:47.273 [INFO][6909] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.276980 env[1555]: time="2025-05-10T00:46:47.275229706Z" level=info msg="TearDown network for sandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" successfully" May 10 00:46:47.276980 env[1555]: time="2025-05-10T00:46:47.275262814Z" level=info msg="StopPodSandbox for \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" returns successfully" May 10 00:46:47.276980 env[1555]: time="2025-05-10T00:46:47.275790505Z" level=info msg="RemovePodSandbox for \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\"" May 10 00:46:47.276980 env[1555]: time="2025-05-10T00:46:47.275820586Z" level=info msg="Forcibly stopping sandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\"" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.315 [WARNING][6937] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.315 [INFO][6937] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.315 [INFO][6937] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" iface="eth0" netns="" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.315 [INFO][6937] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.315 [INFO][6937] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.337 [INFO][6944] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.338 [INFO][6944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.338 [INFO][6944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.344 [WARNING][6944] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.344 [INFO][6944] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" HandleID="k8s-pod-network.d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--w8b2z-eth0" May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.346 [INFO][6944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.351130 env[1555]: 2025-05-10 00:46:47.348 [INFO][6937] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d" May 10 00:46:47.351130 env[1555]: time="2025-05-10T00:46:47.350416715Z" level=info msg="TearDown network for sandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" successfully" May 10 00:46:47.356746 env[1555]: time="2025-05-10T00:46:47.356706470Z" level=info msg="RemovePodSandbox \"d2f89e8ab66286a57dd2177d0842dfb87c884e7f0470de7e31654c7f66c5fb2d\" returns successfully" May 10 00:46:47.357529 env[1555]: time="2025-05-10T00:46:47.357496678Z" level=info msg="StopPodSandbox for \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\"" May 10 00:46:47.357637 env[1555]: time="2025-05-10T00:46:47.357586085Z" level=info msg="TearDown network for sandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" successfully" May 10 00:46:47.357637 env[1555]: time="2025-05-10T00:46:47.357617329Z" level=info msg="StopPodSandbox for \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" returns successfully" May 10 00:46:47.357963 env[1555]: time="2025-05-10T00:46:47.357935572Z" level=info msg="RemovePodSandbox for \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\"" May 10 00:46:47.358760 env[1555]: time="2025-05-10T00:46:47.358176922Z" level=info msg="Forcibly stopping sandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\"" May 10 00:46:47.358760 env[1555]: time="2025-05-10T00:46:47.358263282Z" level=info msg="TearDown network for sandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" successfully" May 10 00:46:47.370933 env[1555]: time="2025-05-10T00:46:47.370882868Z" level=info msg="RemovePodSandbox \"ffbccd472aabbb8b994fa8d1fb47da95a3d9591cf586793af2cf9ae5f8105fb6\" returns successfully" May 10 00:46:47.371410 env[1555]: time="2025-05-10T00:46:47.371380047Z" level=info msg="StopPodSandbox for \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\"" May 10 00:46:47.371504 env[1555]: time="2025-05-10T00:46:47.371462820Z" level=info msg="TearDown network for sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" successfully" May 10 00:46:47.371555 env[1555]: time="2025-05-10T00:46:47.371501432Z" level=info msg="StopPodSandbox for \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" returns successfully" May 10 00:46:47.371948 env[1555]: time="2025-05-10T00:46:47.371905820Z" level=info msg="RemovePodSandbox for \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\"" May 10 00:46:47.372045 env[1555]: time="2025-05-10T00:46:47.371934068Z" level=info msg="Forcibly stopping sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\"" May 10 00:46:47.372045 env[1555]: time="2025-05-10T00:46:47.372034091Z" level=info msg="TearDown network for sandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" successfully" May 10 00:46:47.378338 env[1555]: time="2025-05-10T00:46:47.378291240Z" level=info msg="RemovePodSandbox \"5fa77bf2c69213c99900ddc3bb1b8fa68bd96654a15c14fc394af1c8a1d1ef9d\" returns successfully" May 10 00:46:47.378998 env[1555]: time="2025-05-10T00:46:47.378696416Z" level=info msg="StopPodSandbox for \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\"" May 10 00:46:47.487502 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:47.487649 kernel: audit: type=1325 audit(1746838007.483:1756): table=filter:148 family=2 entries=20 op=nft_register_rule pid=6976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:47.483000 audit[6976]: NETFILTER_CFG table=filter:148 family=2 entries=20 op=nft_register_rule pid=6976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.429 [WARNING][6962] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.429 [INFO][6962] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.430 [INFO][6962] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" iface="eth0" netns="" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.430 [INFO][6962] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.430 [INFO][6962] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.469 [INFO][6969] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.470 [INFO][6969] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.470 [INFO][6969] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.479 [WARNING][6969] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.479 [INFO][6969] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.481 [INFO][6969] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.489940 env[1555]: 2025-05-10 00:46:47.484 [INFO][6962] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.489940 env[1555]: time="2025-05-10T00:46:47.488475509Z" level=info msg="TearDown network for sandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" successfully" May 10 00:46:47.489940 env[1555]: time="2025-05-10T00:46:47.488515999Z" level=info msg="StopPodSandbox for \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" returns successfully" May 10 00:46:47.489940 env[1555]: time="2025-05-10T00:46:47.489374498Z" level=info msg="RemovePodSandbox for \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\"" May 10 00:46:47.489940 env[1555]: time="2025-05-10T00:46:47.489415486Z" level=info msg="Forcibly stopping sandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\"" May 10 00:46:47.483000 audit[6976]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffde8a594a0 a2=0 a3=7ffde8a5948c items=0 ppid=2758 pid=6976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.505750 kernel: audit: type=1300 audit(1746838007.483:1756): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffde8a594a0 a2=0 a3=7ffde8a5948c items=0 ppid=2758 pid=6976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.505878 kernel: audit: type=1327 audit(1746838007.483:1756): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:47.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:47.515859 kernel: audit: type=1325 audit(1746838007.503:1757): table=nat:149 family=2 entries=106 op=nft_unregister_chain pid=6976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:47.503000 audit[6976]: NETFILTER_CFG table=nat:149 family=2 entries=106 op=nft_unregister_chain pid=6976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:47.535781 kernel: audit: type=1300 audit(1746838007.503:1757): arch=c000003e syscall=46 success=yes exit=9612 a0=3 a1=7ffde8a594a0 a2=0 a3=7ffde8a5948c items=0 ppid=2758 pid=6976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.535871 kernel: audit: type=1327 audit(1746838007.503:1757): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:47.503000 audit[6976]: SYSCALL arch=c000003e syscall=46 success=yes exit=9612 a0=3 a1=7ffde8a594a0 a2=0 a3=7ffde8a5948c items=0 ppid=2758 pid=6976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:47.536231 systemd[1]: Started sshd@28-172.31.18.109:22-139.178.89.65:42290.service. May 10 00:46:47.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.109:22-139.178.89.65:42290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.546305 kernel: audit: type=1130 audit(1746838007.536:1758): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.109:22-139.178.89.65:42290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.598 [WARNING][6992] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" WorkloadEndpoint="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.598 [INFO][6992] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.599 [INFO][6992] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" iface="eth0" netns="" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.599 [INFO][6992] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.599 [INFO][6992] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.638 [INFO][7007] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.638 [INFO][7007] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.638 [INFO][7007] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.646 [WARNING][7007] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.646 [INFO][7007] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" HandleID="k8s-pod-network.a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" Workload="ip--172--31--18--109-k8s-calico--apiserver--54f546bcdc--2n7hz-eth0" May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.648 [INFO][7007] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:47.653775 env[1555]: 2025-05-10 00:46:47.650 [INFO][6992] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806" May 10 00:46:47.653775 env[1555]: time="2025-05-10T00:46:47.651945153Z" level=info msg="TearDown network for sandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" successfully" May 10 00:46:47.659249 env[1555]: time="2025-05-10T00:46:47.659197995Z" level=info msg="RemovePodSandbox \"a75172b1b431dd2f9c451dc0b5eb865f575db336807269dedbd135bd4ab3d806\" returns successfully" May 10 00:46:47.793419 kernel: audit: type=1101 audit(1746838007.782:1759): pid=6998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:47.793539 kernel: audit: type=1103 audit(1746838007.791:1760): pid=6998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:47.782000 audit[6998]: USER_ACCT pid=6998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:47.791000 audit[6998]: CRED_ACQ pid=6998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:47.794668 sshd[6998]: Accepted publickey for core from 139.178.89.65 port 42290 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:47.799439 sshd[6998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:47.802785 kernel: audit: type=1006 audit(1746838007.791:1761): pid=6998 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 10 00:46:47.791000 audit[6998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdaa0c7800 a2=3 a3=0 items=0 ppid=1 pid=6998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:47.791000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:47.809423 systemd[1]: Started session-29.scope. May 10 00:46:47.809742 systemd-logind[1540]: New session 29 of user core. May 10 00:46:47.814000 audit[6998]: USER_START pid=6998 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:47.816000 audit[7015]: CRED_ACQ pid=7015 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:48.333509 sshd[6998]: pam_unix(sshd:session): session closed for user core May 10 00:46:48.335000 audit[6998]: USER_END pid=6998 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:48.336000 audit[6998]: CRED_DISP pid=6998 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:48.339581 systemd-logind[1540]: Session 29 logged out. Waiting for processes to exit. May 10 00:46:48.339777 systemd[1]: sshd@28-172.31.18.109:22-139.178.89.65:42290.service: Deactivated successfully. May 10 00:46:48.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.109:22-139.178.89.65:42290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:48.340516 systemd[1]: session-29.scope: Deactivated successfully. May 10 00:46:48.341218 systemd-logind[1540]: Removed session 29. May 10 00:46:48.463000 audit[7025]: NETFILTER_CFG table=filter:150 family=2 entries=20 op=nft_register_rule pid=7025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:48.463000 audit[7025]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdf76ea660 a2=0 a3=7ffdf76ea64c items=0 ppid=2758 pid=7025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:48.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:48.468000 audit[7025]: NETFILTER_CFG table=nat:151 family=2 entries=106 op=nft_register_chain pid=7025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:48.468000 audit[7025]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdf76ea660 a2=0 a3=7ffdf76ea64c items=0 ppid=2758 pid=7025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:48.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:53.366701 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:46:53.366819 kernel: audit: type=1130 audit(1746838013.358:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.18.109:22-139.178.89.65:42302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.18.109:22-139.178.89.65:42302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:53.358981 systemd[1]: Started sshd@29-172.31.18.109:22-139.178.89.65:42302.service. May 10 00:46:53.520000 audit[7028]: USER_ACCT pid=7028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.531496 sshd[7028]: Accepted publickey for core from 139.178.89.65 port 42302 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:53.532557 kernel: audit: type=1101 audit(1746838013.520:1770): pid=7028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.531000 audit[7028]: CRED_ACQ pid=7028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.532991 sshd[7028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:53.540481 systemd[1]: Started session-30.scope. May 10 00:46:53.541999 systemd-logind[1540]: New session 30 of user core. May 10 00:46:53.548283 kernel: audit: type=1103 audit(1746838013.531:1771): pid=7028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.548400 kernel: audit: type=1006 audit(1746838013.531:1772): pid=7028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 10 00:46:53.548445 kernel: audit: type=1300 audit(1746838013.531:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc500ca0c0 a2=3 a3=0 items=0 ppid=1 pid=7028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.531000 audit[7028]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc500ca0c0 a2=3 a3=0 items=0 ppid=1 pid=7028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:53.531000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:53.559153 kernel: audit: type=1327 audit(1746838013.531:1772): proctitle=737368643A20636F7265205B707269765D May 10 00:46:53.548000 audit[7028]: USER_START pid=7028 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.551000 audit[7031]: CRED_ACQ pid=7031 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.576728 kernel: audit: type=1105 audit(1746838013.548:1773): pid=7028 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.576852 kernel: audit: type=1103 audit(1746838013.551:1774): pid=7031 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.792211 sshd[7028]: pam_unix(sshd:session): session closed for user core May 10 00:46:53.793000 audit[7028]: USER_END pid=7028 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.797736 systemd[1]: sshd@29-172.31.18.109:22-139.178.89.65:42302.service: Deactivated successfully. May 10 00:46:53.798603 systemd[1]: session-30.scope: Deactivated successfully. May 10 00:46:53.800866 systemd-logind[1540]: Session 30 logged out. Waiting for processes to exit. May 10 00:46:53.801918 systemd-logind[1540]: Removed session 30. May 10 00:46:53.793000 audit[7028]: CRED_DISP pid=7028 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.808730 kernel: audit: type=1106 audit(1746838013.793:1775): pid=7028 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.808846 kernel: audit: type=1104 audit(1746838013.793:1776): pid=7028 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:53.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-172.31.18.109:22-139.178.89.65:42302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.489000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.489000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.489000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ba4820 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:46:55.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:55.489000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.489000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ba4840 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:46:55.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:55.489000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029f34a0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:46:55.489000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:55.490000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.490000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029f34c0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:46:55.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:58.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.18.109:22-139.178.89.65:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:58.820836 systemd[1]: Started sshd@30-172.31.18.109:22-139.178.89.65:38622.service. May 10 00:46:58.823415 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:46:58.823503 kernel: audit: type=1130 audit(1746838018.820:1782): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.18.109:22-139.178.89.65:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:59.010000 audit[7048]: USER_ACCT pid=7048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.011064 sshd[7048]: Accepted publickey for core from 139.178.89.65 port 38622 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:46:59.021134 kernel: audit: type=1101 audit(1746838019.010:1783): pid=7048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.021000 audit[7048]: CRED_ACQ pid=7048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.021776 sshd[7048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:59.029327 systemd[1]: Started session-31.scope. May 10 00:46:59.032633 kernel: audit: type=1103 audit(1746838019.021:1784): pid=7048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.031586 systemd-logind[1540]: New session 31 of user core. May 10 00:46:59.039188 kernel: audit: type=1006 audit(1746838019.021:1785): pid=7048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 May 10 00:46:59.039873 kernel: audit: type=1300 audit(1746838019.021:1785): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1922040 a2=3 a3=0 items=0 ppid=1 pid=7048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.021000 audit[7048]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1922040 a2=3 a3=0 items=0 ppid=1 pid=7048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:59.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:59.049284 kernel: audit: type=1327 audit(1746838019.021:1785): proctitle=737368643A20636F7265205B707269765D May 10 00:46:59.038000 audit[7048]: USER_START pid=7048 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.061165 kernel: audit: type=1105 audit(1746838019.038:1786): pid=7048 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.061301 kernel: audit: type=1103 audit(1746838019.039:1787): pid=7050 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.039000 audit[7050]: CRED_ACQ pid=7050 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.318846 sshd[7048]: pam_unix(sshd:session): session closed for user core May 10 00:46:59.320000 audit[7048]: USER_END pid=7048 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.322784 systemd[1]: sshd@30-172.31.18.109:22-139.178.89.65:38622.service: Deactivated successfully. May 10 00:46:59.323535 systemd[1]: session-31.scope: Deactivated successfully. May 10 00:46:59.329112 kernel: audit: type=1106 audit(1746838019.320:1788): pid=7048 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.331113 kernel: audit: type=1104 audit(1746838019.320:1789): pid=7048 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.320000 audit[7048]: CRED_DISP pid=7048 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:46:59.330460 systemd-logind[1540]: Session 31 logged out. Waiting for processes to exit. May 10 00:46:59.331792 systemd-logind[1540]: Removed session 31. May 10 00:46:59.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-172.31.18.109:22-139.178.89.65:38622 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:02.856386 systemd[1]: run-containerd-runc-k8s.io-a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa-runc.bz0oak.mount: Deactivated successfully. May 10 00:47:04.343364 systemd[1]: Started sshd@31-172.31.18.109:22-139.178.89.65:38634.service. May 10 00:47:04.349211 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:04.349355 kernel: audit: type=1130 audit(1746838024.342:1791): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.18.109:22-139.178.89.65:38634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:04.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.18.109:22-139.178.89.65:38634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:04.545000 audit[7083]: USER_ACCT pid=7083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.553947 sshd[7083]: Accepted publickey for core from 139.178.89.65 port 38634 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:47:04.554237 kernel: audit: type=1101 audit(1746838024.545:1792): pid=7083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.555000 audit[7083]: CRED_ACQ pid=7083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.558189 sshd[7083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:04.567053 kernel: audit: type=1103 audit(1746838024.555:1793): pid=7083 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.567273 kernel: audit: type=1006 audit(1746838024.555:1794): pid=7083 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 May 10 00:47:04.555000 audit[7083]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc106cdb80 a2=3 a3=0 items=0 ppid=1 pid=7083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:04.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:04.580188 systemd[1]: Started session-32.scope. May 10 00:47:04.582782 kernel: audit: type=1300 audit(1746838024.555:1794): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc106cdb80 a2=3 a3=0 items=0 ppid=1 pid=7083 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:04.582975 kernel: audit: type=1327 audit(1746838024.555:1794): proctitle=737368643A20636F7265205B707269765D May 10 00:47:04.582099 systemd-logind[1540]: New session 32 of user core. May 10 00:47:04.587000 audit[7083]: USER_START pid=7083 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.597108 kernel: audit: type=1105 audit(1746838024.587:1795): pid=7083 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.597253 kernel: audit: type=1103 audit(1746838024.594:1796): pid=7085 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.594000 audit[7085]: CRED_ACQ pid=7085 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.909595 sshd[7083]: pam_unix(sshd:session): session closed for user core May 10 00:47:04.909000 audit[7083]: USER_END pid=7083 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.919108 kernel: audit: type=1106 audit(1746838024.909:1797): pid=7083 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.918000 audit[7083]: CRED_DISP pid=7083 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:04.920716 systemd[1]: sshd@31-172.31.18.109:22-139.178.89.65:38634.service: Deactivated successfully. May 10 00:47:04.921488 systemd[1]: session-32.scope: Deactivated successfully. May 10 00:47:04.923407 systemd-logind[1540]: Session 32 logged out. Waiting for processes to exit. May 10 00:47:04.926028 systemd-logind[1540]: Removed session 32. May 10 00:47:04.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-172.31.18.109:22-139.178.89.65:38634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:04.928173 kernel: audit: type=1104 audit(1746838024.918:1798): pid=7083 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:09.940136 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:09.940265 kernel: audit: type=1130 audit(1746838029.935:1800): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.18.109:22-139.178.89.65:33198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:09.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.18.109:22-139.178.89.65:33198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:09.936299 systemd[1]: Started sshd@32-172.31.18.109:22-139.178.89.65:33198.service. May 10 00:47:10.095000 audit[7095]: USER_ACCT pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.104602 sshd[7095]: Accepted publickey for core from 139.178.89.65 port 33198 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:47:10.105095 kernel: audit: type=1101 audit(1746838030.095:1801): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.104000 audit[7095]: CRED_ACQ pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.112634 sshd[7095]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:10.116312 kernel: audit: type=1103 audit(1746838030.104:1802): pid=7095 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.116407 kernel: audit: type=1006 audit(1746838030.104:1803): pid=7095 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 May 10 00:47:10.104000 audit[7095]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbc419070 a2=3 a3=0 items=0 ppid=1 pid=7095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.124016 kernel: audit: type=1300 audit(1746838030.104:1803): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbc419070 a2=3 a3=0 items=0 ppid=1 pid=7095 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:10.104000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:10.125370 systemd[1]: Started session-33.scope. May 10 00:47:10.126687 systemd-logind[1540]: New session 33 of user core. May 10 00:47:10.128157 kernel: audit: type=1327 audit(1746838030.104:1803): proctitle=737368643A20636F7265205B707269765D May 10 00:47:10.130000 audit[7095]: USER_START pid=7095 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.138000 audit[7097]: CRED_ACQ pid=7097 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.147498 kernel: audit: type=1105 audit(1746838030.130:1804): pid=7095 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.147607 kernel: audit: type=1103 audit(1746838030.138:1805): pid=7097 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.182698 amazon-ssm-agent[1527]: 2025-05-10 00:47:10 INFO [HealthCheck] HealthCheck reporting agent health. May 10 00:47:10.435203 sshd[7095]: pam_unix(sshd:session): session closed for user core May 10 00:47:10.438000 audit[7095]: USER_END pid=7095 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.440880 systemd[1]: sshd@32-172.31.18.109:22-139.178.89.65:33198.service: Deactivated successfully. May 10 00:47:10.441617 systemd[1]: session-33.scope: Deactivated successfully. May 10 00:47:10.443173 systemd-logind[1540]: Session 33 logged out. Waiting for processes to exit. May 10 00:47:10.444163 systemd-logind[1540]: Removed session 33. May 10 00:47:10.438000 audit[7095]: CRED_DISP pid=7095 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.453510 kernel: audit: type=1106 audit(1746838030.438:1806): pid=7095 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.453639 kernel: audit: type=1104 audit(1746838030.438:1807): pid=7095 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:10.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-172.31.18.109:22-139.178.89.65:33198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:15.461365 systemd[1]: Started sshd@33-172.31.18.109:22-139.178.89.65:33200.service. May 10 00:47:15.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.18.109:22-139.178.89.65:33200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:15.464144 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:15.464238 kernel: audit: type=1130 audit(1746838035.461:1809): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.18.109:22-139.178.89.65:33200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:15.658000 audit[7107]: USER_ACCT pid=7107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.659440 sshd[7107]: Accepted publickey for core from 139.178.89.65 port 33200 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:47:15.668000 audit[7107]: CRED_ACQ pid=7107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.671223 sshd[7107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:15.679298 kernel: audit: type=1101 audit(1746838035.658:1810): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.679417 kernel: audit: type=1103 audit(1746838035.668:1811): pid=7107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.679458 kernel: audit: type=1006 audit(1746838035.668:1812): pid=7107 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 May 10 00:47:15.681359 systemd[1]: Started session-34.scope. May 10 00:47:15.682570 systemd-logind[1540]: New session 34 of user core. May 10 00:47:15.684542 kernel: audit: type=1300 audit(1746838035.668:1812): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecba7a270 a2=3 a3=0 items=0 ppid=1 pid=7107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.668000 audit[7107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecba7a270 a2=3 a3=0 items=0 ppid=1 pid=7107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:15.699570 kernel: audit: type=1327 audit(1746838035.668:1812): proctitle=737368643A20636F7265205B707269765D May 10 00:47:15.668000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:15.690000 audit[7107]: USER_START pid=7107 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.707812 kernel: audit: type=1105 audit(1746838035.690:1813): pid=7107 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.707954 kernel: audit: type=1103 audit(1746838035.692:1814): pid=7109 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.692000 audit[7109]: CRED_ACQ pid=7109 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.970930 sshd[7107]: pam_unix(sshd:session): session closed for user core May 10 00:47:15.972000 audit[7107]: USER_END pid=7107 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.983354 kernel: audit: type=1106 audit(1746838035.972:1815): pid=7107 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.983473 kernel: audit: type=1104 audit(1746838035.972:1816): pid=7107 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.972000 audit[7107]: CRED_DISP pid=7107 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:15.982241 systemd[1]: sshd@33-172.31.18.109:22-139.178.89.65:33200.service: Deactivated successfully. May 10 00:47:15.982993 systemd[1]: session-34.scope: Deactivated successfully. May 10 00:47:15.983802 systemd-logind[1540]: Session 34 logged out. Waiting for processes to exit. May 10 00:47:15.985597 systemd-logind[1540]: Removed session 34. May 10 00:47:15.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-172.31.18.109:22-139.178.89.65:33200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:20.996965 systemd[1]: Started sshd@34-172.31.18.109:22-139.178.89.65:37012.service. May 10 00:47:20.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.18.109:22-139.178.89.65:37012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:20.999636 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:20.999749 kernel: audit: type=1130 audit(1746838040.996:1818): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.18.109:22-139.178.89.65:37012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:21.188000 audit[7119]: USER_ACCT pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.197863 sshd[7119]: Accepted publickey for core from 139.178.89.65 port 37012 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:47:21.198833 kernel: audit: type=1101 audit(1746838041.188:1819): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.198915 kernel: audit: type=1103 audit(1746838041.197:1820): pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.197000 audit[7119]: CRED_ACQ pid=7119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.206386 sshd[7119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:21.197000 audit[7119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31a36000 a2=3 a3=0 items=0 ppid=1 pid=7119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:21.214445 systemd[1]: Started session-35.scope. May 10 00:47:21.216756 systemd-logind[1540]: New session 35 of user core. May 10 00:47:21.221290 kernel: audit: type=1006 audit(1746838041.197:1821): pid=7119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 May 10 00:47:21.221383 kernel: audit: type=1300 audit(1746838041.197:1821): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31a36000 a2=3 a3=0 items=0 ppid=1 pid=7119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:21.197000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:21.226820 kernel: audit: type=1327 audit(1746838041.197:1821): proctitle=737368643A20636F7265205B707269765D May 10 00:47:21.235261 kernel: audit: type=1105 audit(1746838041.220:1822): pid=7119 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.235354 kernel: audit: type=1103 audit(1746838041.225:1823): pid=7121 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.220000 audit[7119]: USER_START pid=7119 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.225000 audit[7121]: CRED_ACQ pid=7121 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.439853 sshd[7119]: pam_unix(sshd:session): session closed for user core May 10 00:47:21.440000 audit[7119]: USER_END pid=7119 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.443652 systemd[1]: sshd@34-172.31.18.109:22-139.178.89.65:37012.service: Deactivated successfully. May 10 00:47:21.444387 systemd[1]: session-35.scope: Deactivated successfully. May 10 00:47:21.447805 systemd-logind[1540]: Session 35 logged out. Waiting for processes to exit. May 10 00:47:21.448881 systemd-logind[1540]: Removed session 35. May 10 00:47:21.440000 audit[7119]: CRED_DISP pid=7119 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.455850 kernel: audit: type=1106 audit(1746838041.440:1824): pid=7119 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.455954 kernel: audit: type=1104 audit(1746838041.440:1825): pid=7119 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:47:21.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-172.31.18.109:22-139.178.89.65:37012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:29.415902 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:47:29.416127 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.441819 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.441916 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.441958 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.450152 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.458148 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474659 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474794 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.482296 kernel: audit: type=1400 audit(1746838049.404:1827): avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.404000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.485428 kernel: audit: type=1334 audit(1746838049.404:1827): prog-id=248 op=LOAD May 10 00:47:29.404000 audit: BPF prog-id=248 op=LOAD May 10 00:47:29.404000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7576f4c0 a2=98 a3=3 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.404000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.432000 audit: BPF prog-id=248 op=UNLOAD May 10 00:47:29.432000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.432000 audit: BPF prog-id=249 op=LOAD May 10 00:47:29.432000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7576f2a0 a2=74 a3=540051 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.432000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.474000 audit: BPF prog-id=249 op=UNLOAD May 10 00:47:29.474000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.474000 audit: BPF prog-id=250 op=LOAD May 10 00:47:29.474000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7576f2d0 a2=94 a3=2 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.474000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.481000 audit: BPF prog-id=250 op=UNLOAD May 10 00:47:29.598000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.598000 audit: BPF prog-id=251 op=LOAD May 10 00:47:29.598000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7576f190 a2=40 a3=1 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.598000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.599000 audit: BPF prog-id=251 op=UNLOAD May 10 00:47:29.599000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.599000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc7576f260 a2=50 a3=7ffc7576f340 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.599000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.609000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.609000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7576f1a0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.609000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7576f1d0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7576f0e0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7576f1f0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7576f1d0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7576f1c0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7576f1f0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7576f1d0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7576f1f0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7576f1c0 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7576f230 a2=28 a3=0 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7576efe0 a2=50 a3=1 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit: BPF prog-id=252 op=LOAD May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7576efe0 a2=94 a3=5 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit: BPF prog-id=252 op=UNLOAD May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7576f090 a2=50 a3=1 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc7576f1b0 a2=4 a3=38 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.610000 audit[7186]: AVC avc: denied { confidentiality } for pid=7186 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:29.610000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7576f200 a2=94 a3=6 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.610000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { confidentiality } for pid=7186 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:29.611000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7576e9b0 a2=94 a3=83 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.611000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { perfmon } for pid=7186 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { bpf } for pid=7186 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.611000 audit[7186]: AVC avc: denied { confidentiality } for pid=7186 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:29.611000 audit[7186]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7576e9b0 a2=94 a3=83 items=0 ppid=7165 pid=7186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.611000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit: BPF prog-id=253 op=LOAD May 10 00:47:29.613000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbd6a3f60 a2=98 a3=3 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.613000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.613000 audit: BPF prog-id=253 op=UNLOAD May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit: BPF prog-id=254 op=LOAD May 10 00:47:29.613000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdbd6a3d40 a2=74 a3=540051 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.613000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.613000 audit: BPF prog-id=254 op=UNLOAD May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.613000 audit: BPF prog-id=255 op=LOAD May 10 00:47:29.613000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdbd6a3d70 a2=94 a3=2 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.613000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.614000 audit: BPF prog-id=255 op=UNLOAD May 10 00:47:29.730000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit: BPF prog-id=256 op=LOAD May 10 00:47:29.730000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdbd6a3c30 a2=40 a3=1 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.730000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.730000 audit: BPF prog-id=256 op=UNLOAD May 10 00:47:29.730000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.730000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdbd6a3d00 a2=50 a3=7ffdbd6a3de0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.730000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbd6a3c40 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbd6a3c70 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbd6a3b80 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbd6a3c90 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbd6a3c70 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbd6a3c60 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbd6a3c90 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbd6a3c70 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbd6a3c90 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdbd6a3c60 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.741000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.741000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdbd6a3cd0 a2=28 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.741000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdbd6a3a80 a2=50 a3=1 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit: BPF prog-id=257 op=LOAD May 10 00:47:29.742000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdbd6a3a80 a2=94 a3=5 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.742000 audit: BPF prog-id=257 op=UNLOAD May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdbd6a3b30 a2=50 a3=1 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdbd6a3c50 a2=4 a3=38 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.742000 audit[7187]: AVC avc: denied { confidentiality } for pid=7187 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:29.742000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdbd6a3ca0 a2=94 a3=6 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.742000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { confidentiality } for pid=7187 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:29.743000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdbd6a3450 a2=94 a3=83 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.743000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { perfmon } for pid=7187 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: AVC avc: denied { confidentiality } for pid=7187 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:47:29.743000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdbd6a3450 a2=94 a3=83 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.743000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=0 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.743000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=3d items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.743000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.743000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.743000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=41 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.743000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=45 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=49 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=4d items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=51 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=52 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=53 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=54 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=55 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=56 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=57 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=58 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=59 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=5a items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=5b items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=5c items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=5d items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.744000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.744000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=5e items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.744000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=5f items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=60 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=61 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=62 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=63 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=64 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=65 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=66 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=67 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=6a items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=6d items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=6e items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=71 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=72 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.745000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.745000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=75 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.745000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=8a items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=8b items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=8e items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=93 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=96 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=97 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=9a items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=9b items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=9e items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=9f items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=a2 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=a3 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=a6 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=a9 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.746000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.746000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=c9 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.746000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.747000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.747000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=cc items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.747000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.747000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=cf items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.747000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.747000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=d8 items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.747000 audit[7187]: AVC avc: denied { bpf } for pid=7187 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.747000 audit[7187]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdbd6a4e90 a2=10 a3=db items=0 ppid=7165 pid=7187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.747000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:47:29.803000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.803000 audit: BPF prog-id=258 op=LOAD May 10 00:47:29.803000 audit[7190]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcaa69ca50 a2=98 a3=1999999999999999 items=0 ppid=7165 pid=7190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.803000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:47:29.804000 audit: BPF prog-id=258 op=UNLOAD May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit: BPF prog-id=259 op=LOAD May 10 00:47:29.804000 audit[7190]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcaa69c930 a2=74 a3=ffff items=0 ppid=7165 pid=7190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.804000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:47:29.804000 audit: BPF prog-id=259 op=UNLOAD May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { perfmon } for pid=7190 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit[7190]: AVC avc: denied { bpf } for pid=7190 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:47:29.804000 audit: BPF prog-id=260 op=LOAD May 10 00:47:29.804000 audit[7190]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcaa69c970 a2=40 a3=7ffcaa69cb50 items=0 ppid=7165 pid=7190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:29.804000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:47:29.804000 audit: BPF prog-id=260 op=UNLOAD May 10 00:47:32.846887 systemd[1]: run-containerd-runc-k8s.io-a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa-runc.O2ceUJ.mount: Deactivated successfully. May 10 00:47:38.567000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:38.570699 kernel: kauditd_printk_skb: 489 callbacks suppressed May 10 00:47:38.570821 kernel: audit: type=1400 audit(1746838058.567:1943): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:38.567000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010dfa80 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:38.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:38.603790 kernel: audit: type=1300 audit(1746838058.567:1943): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010dfa80 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:38.603940 kernel: audit: type=1327 audit(1746838058.567:1943): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:38.567000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:38.567000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a5aab0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:38.627580 kernel: audit: type=1400 audit(1746838058.567:1944): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:38.627707 kernel: audit: type=1300 audit(1746838058.567:1944): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a5aab0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:38.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:38.644105 kernel: audit: type=1327 audit(1746838058.567:1944): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:38.630000 audit[5087]: AVC avc: denied { watch } for pid=5087 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_16.3311537486/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c415,c621 tclass=file permissive=0 May 10 00:47:38.630000 audit[5087]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e26da0 a2=fc6 a3=0 items=0 ppid=4473 pid=5087 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 key=(null) May 10 00:47:38.672177 kernel: audit: type=1400 audit(1746838058.630:1945): avc: denied { watch } for pid=5087 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_16.3311537486/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c415,c621 tclass=file permissive=0 May 10 00:47:38.672327 kernel: audit: type=1300 audit(1746838058.630:1945): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e26da0 a2=fc6 a3=0 items=0 ppid=4473 pid=5087 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c415,c621 key=(null) May 10 00:47:38.630000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:38.688110 kernel: audit: type=1327 audit(1746838058.630:1945): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:39.665000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.665000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.665000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a255320 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:47:39.674133 kernel: audit: type=1400 audit(1746838059.665:1946): avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:47:39.665000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0130cf950 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:47:39.665000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:47:39.666000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.666000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a255680 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:47:39.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:47:39.666000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.666000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c010d975c0 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:47:39.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:47:39.733000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.733000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c010d97a60 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:47:39.733000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:47:39.733000 audit[2367]: AVC avc: denied { watch } for pid=2367 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:39.733000 audit[2367]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c010e98270 a2=fc6 a3=0 items=0 ppid=2212 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c375,c597 key=(null) May 10 00:47:39.733000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E313039002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:47:55.490000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.493223 kernel: kauditd_printk_skb: 17 callbacks suppressed May 10 00:47:55.493340 kernel: audit: type=1400 audit(1746838075.490:1953): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.490000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.507245 kernel: audit: type=1400 audit(1746838075.490:1952): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.507379 kernel: audit: type=1300 audit(1746838075.490:1952): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d45560 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.490000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d45560 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:55.524611 kernel: audit: type=1327 audit(1746838075.490:1952): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:55.524828 kernel: audit: type=1400 audit(1746838075.490:1954): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.490000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.531601 kernel: audit: type=1300 audit(1746838075.490:1954): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d458c0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.490000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d458c0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:55.549069 kernel: audit: type=1327 audit(1746838075.490:1954): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:55.550063 kernel: audit: type=1400 audit(1746838075.490:1955): avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.490000 audit[2379]: AVC avc: denied { watch } for pid=2379 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:47:55.490000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d458e0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.565683 kernel: audit: type=1300 audit(1746838075.490:1955): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d458e0 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.565862 kernel: audit: type=1327 audit(1746838075.490:1955): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:55.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:55.490000 audit[2379]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000efe500 a2=fc6 a3=0 items=0 ppid=2231 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:47:55.490000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:48:02.847465 systemd[1]: run-containerd-runc-k8s.io-a58c4322b47fe24b0913defbc371f8ef61cbc05aa499e4d7d3926a7924a350aa-runc.QsMAFy.mount: Deactivated successfully. May 10 00:48:08.777672 kubelet[2527]: E0510 00:48:08.775887 2527 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.109:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-109?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 10 00:48:08.794993 systemd[1]: cri-containerd-5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2.scope: Deactivated successfully. May 10 00:48:08.795264 systemd[1]: cri-containerd-5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2.scope: Consumed 7.422s CPU time. May 10 00:48:08.799760 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 00:48:08.799838 kernel: audit: type=1334 audit(1746838088.794:1956): prog-id=114 op=UNLOAD May 10 00:48:08.794000 audit: BPF prog-id=114 op=UNLOAD May 10 00:48:08.799000 audit: BPF prog-id=117 op=UNLOAD May 10 00:48:08.806125 kernel: audit: type=1334 audit(1746838088.799:1957): prog-id=117 op=UNLOAD May 10 00:48:08.824640 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2-rootfs.mount: Deactivated successfully. May 10 00:48:08.826347 env[1555]: time="2025-05-10T00:48:08.826298370Z" level=info msg="shim disconnected" id=5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2 May 10 00:48:08.828207 env[1555]: time="2025-05-10T00:48:08.826348809Z" level=warning msg="cleaning up after shim disconnected" id=5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2 namespace=k8s.io May 10 00:48:08.828207 env[1555]: time="2025-05-10T00:48:08.826473769Z" level=info msg="cleaning up dead shim" May 10 00:48:08.836028 env[1555]: time="2025-05-10T00:48:08.835981430Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:48:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7771 runtime=io.containerd.runc.v2\n" May 10 00:48:09.088556 systemd[1]: cri-containerd-1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29.scope: Deactivated successfully. May 10 00:48:09.088826 systemd[1]: cri-containerd-1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29.scope: Consumed 4.134s CPU time. May 10 00:48:09.092000 audit: BPF prog-id=77 op=UNLOAD May 10 00:48:09.097143 kernel: audit: type=1334 audit(1746838089.092:1958): prog-id=77 op=UNLOAD May 10 00:48:09.097250 kernel: audit: type=1334 audit(1746838089.092:1959): prog-id=101 op=UNLOAD May 10 00:48:09.092000 audit: BPF prog-id=101 op=UNLOAD May 10 00:48:09.115732 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29-rootfs.mount: Deactivated successfully. May 10 00:48:09.117058 env[1555]: time="2025-05-10T00:48:09.117015391Z" level=info msg="shim disconnected" id=1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29 May 10 00:48:09.117214 env[1555]: time="2025-05-10T00:48:09.117059509Z" level=warning msg="cleaning up after shim disconnected" id=1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29 namespace=k8s.io May 10 00:48:09.117214 env[1555]: time="2025-05-10T00:48:09.117068544Z" level=info msg="cleaning up dead shim" May 10 00:48:09.126307 env[1555]: time="2025-05-10T00:48:09.126258018Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:48:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7796 runtime=io.containerd.runc.v2\n" May 10 00:48:09.810760 kubelet[2527]: I0510 00:48:09.810730 2527 scope.go:117] "RemoveContainer" containerID="1540663a46da5d545a95424ad798c67a9508f7944b0da30e6d405dfb842adf29" May 10 00:48:09.822811 kubelet[2527]: I0510 00:48:09.822779 2527 scope.go:117] "RemoveContainer" containerID="5409db30482b5680ea896f53752633fd0cbed93d4550d2d3bed89a796a889ce2" May 10 00:48:09.859445 env[1555]: time="2025-05-10T00:48:09.859402726Z" level=info msg="CreateContainer within sandbox \"7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" May 10 00:48:09.859909 env[1555]: time="2025-05-10T00:48:09.859599512Z" level=info msg="CreateContainer within sandbox \"b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" May 10 00:48:09.880336 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1198589410.mount: Deactivated successfully. May 10 00:48:09.896013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1655003699.mount: Deactivated successfully. May 10 00:48:09.902116 env[1555]: time="2025-05-10T00:48:09.898270829Z" level=info msg="CreateContainer within sandbox \"b723d158cda723bf8f291763084891e4d2bbfcdac5d47b4f1cac9240cf20541f\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"074c2c211b41bef370a1ebad615e9536169c7deba346cec701a09446d3cb2087\"" May 10 00:48:09.902116 env[1555]: time="2025-05-10T00:48:09.900502075Z" level=info msg="StartContainer for \"074c2c211b41bef370a1ebad615e9536169c7deba346cec701a09446d3cb2087\"" May 10 00:48:09.911447 env[1555]: time="2025-05-10T00:48:09.911406294Z" level=info msg="CreateContainer within sandbox \"7b116e42617ebc14aa2ff2f19b63229fe3d045b1b343b53469343861de5cb932\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"d1834aab88ce74b60660cd82cdcf42994adc4fc2dfb74ff36e34fadd491cb3b0\"" May 10 00:48:09.912893 env[1555]: time="2025-05-10T00:48:09.912270919Z" level=info msg="StartContainer for \"d1834aab88ce74b60660cd82cdcf42994adc4fc2dfb74ff36e34fadd491cb3b0\"" May 10 00:48:09.925057 systemd[1]: Started cri-containerd-074c2c211b41bef370a1ebad615e9536169c7deba346cec701a09446d3cb2087.scope. May 10 00:48:09.936096 systemd[1]: Started cri-containerd-d1834aab88ce74b60660cd82cdcf42994adc4fc2dfb74ff36e34fadd491cb3b0.scope. May 10 00:48:09.971111 kernel: audit: type=1400 audit(1746838089.962:1960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.979953 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:48:09.980130 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:48:09.980171 kernel: audit: backlog limit exceeded May 10 00:48:09.987293 kernel: audit: type=1400 audit(1746838089.962:1961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.991142 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:48:09.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit: BPF prog-id=261 op=LOAD May 10 00:48:09.962000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2904 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:09.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346332633231316234316265663337306131656261643631356539 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2904 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:09.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346332633231316234316265663337306131656261643631356539 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.962000 audit: BPF prog-id=262 op=LOAD May 10 00:48:09.962000 audit[7819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cbd00 items=0 ppid=2904 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:09.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346332633231316234316265663337306131656261643631356539 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit: BPF prog-id=263 op=LOAD May 10 00:48:09.973000 audit[7819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cbd48 items=0 ppid=2904 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:09.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346332633231316234316265663337306131656261643631356539 May 10 00:48:09.973000 audit: BPF prog-id=263 op=UNLOAD May 10 00:48:09.973000 audit: BPF prog-id=262 op=UNLOAD May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { perfmon } for pid=7819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: AVC avc: denied { bpf } for pid=7819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:09.973000 audit[7819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000330158 items=0 ppid=2904 pid=7819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:09.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037346332633231316234316265663337306131656261643631356539 May 10 00:48:10.052829 env[1555]: time="2025-05-10T00:48:10.052780267Z" level=info msg="StartContainer for \"d1834aab88ce74b60660cd82cdcf42994adc4fc2dfb74ff36e34fadd491cb3b0\" returns successfully" May 10 00:48:10.057030 env[1555]: time="2025-05-10T00:48:10.056979131Z" level=info msg="StartContainer for \"074c2c211b41bef370a1ebad615e9536169c7deba346cec701a09446d3cb2087\" returns successfully" May 10 00:48:10.884401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2328443793.mount: Deactivated successfully. May 10 00:48:11.465000 audit[7853]: AVC avc: denied { watch } for pid=7853 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:48:11.465000 audit[7853]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000a8e4e0 a2=fc6 a3=0 items=0 ppid=2231 pid=7853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:48:11.465000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:48:11.467000 audit[7853]: AVC avc: denied { watch } for pid=7853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:48:11.467000 audit[7853]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003760e0 a2=fc6 a3=0 items=0 ppid=2231 pid=7853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c251,c725 key=(null) May 10 00:48:11.467000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:48:13.425797 systemd[1]: cri-containerd-c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195.scope: Deactivated successfully. May 10 00:48:13.426025 systemd[1]: cri-containerd-c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195.scope: Consumed 1.951s CPU time. May 10 00:48:13.428000 audit: BPF prog-id=81 op=UNLOAD May 10 00:48:13.428000 audit: BPF prog-id=100 op=UNLOAD May 10 00:48:13.449188 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195-rootfs.mount: Deactivated successfully. May 10 00:48:13.449952 env[1555]: time="2025-05-10T00:48:13.449211803Z" level=info msg="shim disconnected" id=c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195 May 10 00:48:13.449952 env[1555]: time="2025-05-10T00:48:13.449253751Z" level=warning msg="cleaning up after shim disconnected" id=c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195 namespace=k8s.io May 10 00:48:13.449952 env[1555]: time="2025-05-10T00:48:13.449263150Z" level=info msg="cleaning up dead shim" May 10 00:48:13.458531 env[1555]: time="2025-05-10T00:48:13.458474672Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:48:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7896 runtime=io.containerd.runc.v2\n" May 10 00:48:13.836946 kubelet[2527]: I0510 00:48:13.836451 2527 scope.go:117] "RemoveContainer" containerID="c223d412f19688a70409eef1705411f2ea234c5c2002fdc98ba89936bf76f195" May 10 00:48:13.839416 env[1555]: time="2025-05-10T00:48:13.839372584Z" level=info msg="CreateContainer within sandbox \"eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" May 10 00:48:13.858364 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount603913815.mount: Deactivated successfully. May 10 00:48:13.873195 env[1555]: time="2025-05-10T00:48:13.873142301Z" level=info msg="CreateContainer within sandbox \"eb36b3efc635497e5ad2333a76c0ec898a1b9bf838b3ff9dd1e76e048c4bc41a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"1ad0de9cfd5f2b54e5b02c1b3d687eb0cc134624e5948608cd896cd183274687\"" May 10 00:48:13.873710 env[1555]: time="2025-05-10T00:48:13.873685369Z" level=info msg="StartContainer for \"1ad0de9cfd5f2b54e5b02c1b3d687eb0cc134624e5948608cd896cd183274687\"" May 10 00:48:13.891384 systemd[1]: Started cri-containerd-1ad0de9cfd5f2b54e5b02c1b3d687eb0cc134624e5948608cd896cd183274687.scope. May 10 00:48:13.907901 kernel: kauditd_printk_skb: 182 callbacks suppressed May 10 00:48:13.908747 kernel: audit: type=1400 audit(1746838093.904:1992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.918013 kernel: audit: type=1400 audit(1746838093.904:1993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.918117 kernel: audit: type=1400 audit(1746838093.905:1994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.923176 kernel: audit: type=1400 audit(1746838093.905:1995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.933323 kernel: audit: type=1400 audit(1746838093.905:1996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.938811 kernel: audit: type=1400 audit(1746838093.905:1997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.944306 kernel: audit: type=1400 audit(1746838093.905:1998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.949577 kernel: audit: type=1400 audit(1746838093.905:1999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.954989 kernel: audit: type=1400 audit(1746838093.905:2000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.906000 audit: BPF prog-id=269 op=LOAD May 10 00:48:13.908000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2264 pid=7918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:13.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643064653963666435663262353465356230326331623364363837 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2264 pid=7918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:13.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643064653963666435663262353465356230326331623364363837 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.961096 kernel: audit: type=1400 audit(1746838093.906:2001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.908000 audit: BPF prog-id=270 op=LOAD May 10 00:48:13.908000 audit[7918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00021e370 items=0 ppid=2264 pid=7918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:13.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643064653963666435663262353465356230326331623364363837 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.911000 audit: BPF prog-id=271 op=LOAD May 10 00:48:13.911000 audit[7918]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00021e3b8 items=0 ppid=2264 pid=7918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:13.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643064653963666435663262353465356230326331623364363837 May 10 00:48:13.927000 audit: BPF prog-id=271 op=UNLOAD May 10 00:48:13.927000 audit: BPF prog-id=270 op=UNLOAD May 10 00:48:13.927000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { perfmon } for pid=7918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit[7918]: AVC avc: denied { bpf } for pid=7918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:13.927000 audit: BPF prog-id=272 op=LOAD May 10 00:48:13.927000 audit[7918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00021e7c8 items=0 ppid=2264 pid=7918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:13.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161643064653963666435663262353465356230326331623364363837 May 10 00:48:13.980354 env[1555]: time="2025-05-10T00:48:13.980313779Z" level=info msg="StartContainer for \"1ad0de9cfd5f2b54e5b02c1b3d687eb0cc134624e5948608cd896cd183274687\" returns successfully" May 10 00:48:18.789610 kubelet[2527]: E0510 00:48:18.789552 2527 request.go:1116] Unexpected error when reading response body: net/http: request canceled (Client.Timeout or context cancellation while reading body) May 10 00:48:18.790021 kubelet[2527]: E0510 00:48:18.789668 2527 controller.go:195] "Failed to update lease" err="unexpected error when reading response body. Please retry. Original error: net/http: request canceled (Client.Timeout or context cancellation while reading body)"