May 10 00:48:59.997338 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:48:59.997370 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:48:59.997388 kernel: BIOS-provided physical RAM map: May 10 00:48:59.997399 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:48:59.997410 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 10 00:48:59.997420 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:48:59.997434 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:48:59.997445 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:48:59.997459 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:48:59.997470 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:48:59.997481 kernel: NX (Execute Disable) protection: active May 10 00:48:59.997492 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:48:59.997504 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:48:59.997516 kernel: extended physical RAM map: May 10 00:48:59.997533 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:48:59.997545 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 10 00:48:59.997557 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 10 00:48:59.997569 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 10 00:48:59.997581 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:48:59.997594 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:48:59.997606 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:48:59.997618 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:48:59.997630 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:48:59.997642 kernel: efi: EFI v2.70 by EDK II May 10 00:48:59.997657 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 10 00:48:59.997669 kernel: SMBIOS 2.7 present. May 10 00:48:59.997681 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 10 00:48:59.997693 kernel: Hypervisor detected: KVM May 10 00:48:59.997705 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:48:59.997717 kernel: kvm-clock: cpu 0, msr 2a196001, primary cpu clock May 10 00:48:59.997729 kernel: kvm-clock: using sched offset of 4056653549 cycles May 10 00:48:59.997742 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:48:59.997755 kernel: tsc: Detected 2499.994 MHz processor May 10 00:48:59.997768 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:48:59.997780 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:48:59.997795 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 10 00:48:59.997807 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:48:59.997820 kernel: Using GB pages for direct mapping May 10 00:48:59.997832 kernel: Secure boot disabled May 10 00:48:59.997845 kernel: ACPI: Early table checksum verification disabled May 10 00:48:59.997862 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 10 00:48:59.997876 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 10 00:48:59.997892 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 10 00:48:59.997905 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 10 00:48:59.997919 kernel: ACPI: FACS 0x00000000789D0000 000040 May 10 00:48:59.997932 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 10 00:48:59.997946 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 10 00:48:59.997960 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 10 00:48:59.997973 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 10 00:48:59.997989 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 10 00:48:59.998002 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:48:59.998026 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:48:59.998040 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 10 00:48:59.998053 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 10 00:48:59.998067 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 10 00:48:59.998080 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 10 00:48:59.998094 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 10 00:48:59.998107 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 10 00:48:59.998123 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 10 00:49:00.000825 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 10 00:49:00.000857 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 10 00:49:00.000873 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 10 00:49:00.000887 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 10 00:49:00.000902 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 10 00:49:00.000916 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:49:00.000930 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:49:00.000945 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 10 00:49:00.000965 kernel: NUMA: Initialized distance table, cnt=1 May 10 00:49:00.000979 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 10 00:49:00.000995 kernel: Zone ranges: May 10 00:49:00.001010 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:49:00.001024 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 10 00:49:00.001039 kernel: Normal empty May 10 00:49:00.001053 kernel: Movable zone start for each node May 10 00:49:00.001067 kernel: Early memory node ranges May 10 00:49:00.001082 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:49:00.001099 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 10 00:49:00.001113 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 10 00:49:00.001127 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 10 00:49:00.001162 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:49:00.001176 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:49:00.001191 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:49:00.001206 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 10 00:49:00.001221 kernel: ACPI: PM-Timer IO Port: 0xb008 May 10 00:49:00.001235 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:49:00.001253 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 10 00:49:00.001268 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:49:00.001282 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:49:00.001297 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:49:00.001311 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:49:00.001326 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:49:00.001340 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:49:00.001355 kernel: TSC deadline timer available May 10 00:49:00.001369 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:49:00.001386 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 10 00:49:00.001400 kernel: Booting paravirtualized kernel on KVM May 10 00:49:00.001415 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:49:00.001429 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:49:00.001444 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:49:00.001458 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:49:00.001473 kernel: pcpu-alloc: [0] 0 1 May 10 00:49:00.001487 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 10 00:49:00.001502 kernel: kvm-guest: PV spinlocks enabled May 10 00:49:00.001519 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:49:00.001533 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 10 00:49:00.001548 kernel: Policy zone: DMA32 May 10 00:49:00.001565 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:00.001580 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:49:00.001595 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:49:00.001609 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:49:00.001624 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:49:00.001641 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 160904K reserved, 0K cma-reserved) May 10 00:49:00.001656 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:49:00.001671 kernel: Kernel/User page tables isolation: enabled May 10 00:49:00.001685 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:49:00.001699 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:49:00.001713 kernel: rcu: Hierarchical RCU implementation. May 10 00:49:00.001729 kernel: rcu: RCU event tracing is enabled. May 10 00:49:00.001757 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:49:00.001772 kernel: Rude variant of Tasks RCU enabled. May 10 00:49:00.001787 kernel: Tracing variant of Tasks RCU enabled. May 10 00:49:00.001803 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:49:00.001818 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:49:00.001836 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:49:00.001851 kernel: random: crng init done May 10 00:49:00.001865 kernel: Console: colour dummy device 80x25 May 10 00:49:00.001880 kernel: printk: console [tty0] enabled May 10 00:49:00.001895 kernel: printk: console [ttyS0] enabled May 10 00:49:00.001911 kernel: ACPI: Core revision 20210730 May 10 00:49:00.001926 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 10 00:49:00.001944 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:49:00.001959 kernel: x2apic enabled May 10 00:49:00.001975 kernel: Switched APIC routing to physical x2apic. May 10 00:49:00.001990 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns May 10 00:49:00.002005 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499994) May 10 00:49:00.002032 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:49:00.002047 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:49:00.002064 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:49:00.002079 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:49:00.002094 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:49:00.002106 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:49:00.002118 kernel: RETBleed: Vulnerable May 10 00:49:00.002175 kernel: Speculative Store Bypass: Vulnerable May 10 00:49:00.002188 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:49:00.002200 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:49:00.002213 kernel: GDS: Unknown: Dependent on hypervisor status May 10 00:49:00.002225 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:49:00.002236 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:49:00.002252 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:49:00.002265 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 10 00:49:00.002278 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 10 00:49:00.002292 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:49:00.002306 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:49:00.002319 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:49:00.002331 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 10 00:49:00.002344 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:49:00.002358 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 10 00:49:00.002372 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 10 00:49:00.002387 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 10 00:49:00.002404 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 10 00:49:00.002419 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 10 00:49:00.002433 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 10 00:49:00.002448 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 10 00:49:00.002462 kernel: Freeing SMP alternatives memory: 32K May 10 00:49:00.002477 kernel: pid_max: default: 32768 minimum: 301 May 10 00:49:00.002491 kernel: LSM: Security Framework initializing May 10 00:49:00.002505 kernel: SELinux: Initializing. May 10 00:49:00.002519 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:49:00.002533 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:49:00.002548 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:49:00.002566 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:49:00.002581 kernel: signal: max sigframe size: 3632 May 10 00:49:00.002596 kernel: rcu: Hierarchical SRCU implementation. May 10 00:49:00.002610 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:49:00.002626 kernel: smp: Bringing up secondary CPUs ... May 10 00:49:00.002641 kernel: x86: Booting SMP configuration: May 10 00:49:00.002656 kernel: .... node #0, CPUs: #1 May 10 00:49:00.002670 kernel: kvm-clock: cpu 1, msr 2a196041, secondary cpu clock May 10 00:49:00.002684 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 10 00:49:00.002703 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 10 00:49:00.002719 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:49:00.002734 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:49:00.002748 kernel: smpboot: Max logical packages: 1 May 10 00:49:00.002763 kernel: smpboot: Total of 2 processors activated (9999.97 BogoMIPS) May 10 00:49:00.002778 kernel: devtmpfs: initialized May 10 00:49:00.002792 kernel: x86/mm: Memory block size: 128MB May 10 00:49:00.002808 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 10 00:49:00.002823 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:49:00.002841 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:49:00.002856 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:49:00.002871 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:49:00.002886 kernel: audit: initializing netlink subsys (disabled) May 10 00:49:00.002901 kernel: audit: type=2000 audit(1746838140.067:1): state=initialized audit_enabled=0 res=1 May 10 00:49:00.002915 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:49:00.002930 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:49:00.002945 kernel: cpuidle: using governor menu May 10 00:49:00.002960 kernel: ACPI: bus type PCI registered May 10 00:49:00.002977 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:49:00.002992 kernel: dca service started, version 1.12.1 May 10 00:49:00.003006 kernel: PCI: Using configuration type 1 for base access May 10 00:49:00.003022 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:49:00.003037 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:49:00.003051 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:49:00.003066 kernel: ACPI: Added _OSI(Module Device) May 10 00:49:00.003081 kernel: ACPI: Added _OSI(Processor Device) May 10 00:49:00.003096 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:49:00.003113 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:49:00.003128 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:49:00.011195 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:49:00.011220 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:49:00.011234 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 10 00:49:00.011248 kernel: ACPI: Interpreter enabled May 10 00:49:00.011261 kernel: ACPI: PM: (supports S0 S5) May 10 00:49:00.011274 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:49:00.011287 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:49:00.011309 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:49:00.011322 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:49:00.011527 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:49:00.011649 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:49:00.011665 kernel: acpiphp: Slot [3] registered May 10 00:49:00.011678 kernel: acpiphp: Slot [4] registered May 10 00:49:00.011691 kernel: acpiphp: Slot [5] registered May 10 00:49:00.011707 kernel: acpiphp: Slot [6] registered May 10 00:49:00.011720 kernel: acpiphp: Slot [7] registered May 10 00:49:00.011733 kernel: acpiphp: Slot [8] registered May 10 00:49:00.011746 kernel: acpiphp: Slot [9] registered May 10 00:49:00.011758 kernel: acpiphp: Slot [10] registered May 10 00:49:00.011772 kernel: acpiphp: Slot [11] registered May 10 00:49:00.011785 kernel: acpiphp: Slot [12] registered May 10 00:49:00.011798 kernel: acpiphp: Slot [13] registered May 10 00:49:00.011810 kernel: acpiphp: Slot [14] registered May 10 00:49:00.011823 kernel: acpiphp: Slot [15] registered May 10 00:49:00.011838 kernel: acpiphp: Slot [16] registered May 10 00:49:00.011851 kernel: acpiphp: Slot [17] registered May 10 00:49:00.011863 kernel: acpiphp: Slot [18] registered May 10 00:49:00.011876 kernel: acpiphp: Slot [19] registered May 10 00:49:00.011888 kernel: acpiphp: Slot [20] registered May 10 00:49:00.011901 kernel: acpiphp: Slot [21] registered May 10 00:49:00.011913 kernel: acpiphp: Slot [22] registered May 10 00:49:00.011926 kernel: acpiphp: Slot [23] registered May 10 00:49:00.011938 kernel: acpiphp: Slot [24] registered May 10 00:49:00.011954 kernel: acpiphp: Slot [25] registered May 10 00:49:00.011967 kernel: acpiphp: Slot [26] registered May 10 00:49:00.011980 kernel: acpiphp: Slot [27] registered May 10 00:49:00.011993 kernel: acpiphp: Slot [28] registered May 10 00:49:00.012006 kernel: acpiphp: Slot [29] registered May 10 00:49:00.012018 kernel: acpiphp: Slot [30] registered May 10 00:49:00.012031 kernel: acpiphp: Slot [31] registered May 10 00:49:00.012044 kernel: PCI host bridge to bus 0000:00 May 10 00:49:00.012178 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:49:00.012285 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:49:00.012387 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:49:00.012488 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:49:00.012588 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 10 00:49:00.012688 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:49:00.012813 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:49:00.012937 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:49:00.013061 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 10 00:49:00.013189 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 10 00:49:00.013306 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 10 00:49:00.013416 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 10 00:49:00.013530 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 10 00:49:00.013644 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 10 00:49:00.013762 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 10 00:49:00.013874 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 10 00:49:00.013996 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 10 00:49:00.014122 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 10 00:49:00.014246 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:49:00.014359 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 10 00:49:00.014478 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:49:00.014693 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 10 00:49:00.014830 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 10 00:49:00.014964 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 10 00:49:00.015091 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 10 00:49:00.015110 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:49:00.015126 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:49:00.015156 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:49:00.015176 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:49:00.015191 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:49:00.015207 kernel: iommu: Default domain type: Translated May 10 00:49:00.015222 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:49:00.015348 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 10 00:49:00.015471 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:49:00.015595 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 10 00:49:00.015614 kernel: vgaarb: loaded May 10 00:49:00.015629 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:49:00.015649 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:49:00.015664 kernel: PTP clock support registered May 10 00:49:00.015679 kernel: Registered efivars operations May 10 00:49:00.015695 kernel: PCI: Using ACPI for IRQ routing May 10 00:49:00.015710 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:49:00.015725 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 10 00:49:00.015740 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 10 00:49:00.015755 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 10 00:49:00.015770 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 10 00:49:00.015787 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 10 00:49:00.015803 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:49:00.015818 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:49:00.015833 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:49:00.015849 kernel: pnp: PnP ACPI init May 10 00:49:00.015864 kernel: pnp: PnP ACPI: found 5 devices May 10 00:49:00.015879 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:49:00.015895 kernel: NET: Registered PF_INET protocol family May 10 00:49:00.015910 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:49:00.015927 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:49:00.015943 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:49:00.015958 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:49:00.015972 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:49:00.015984 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:49:00.015995 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:49:00.016008 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:49:00.016021 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:49:00.016037 kernel: NET: Registered PF_XDP protocol family May 10 00:49:00.016167 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:49:00.016279 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:49:00.016381 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:49:00.016483 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:49:00.016583 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 10 00:49:00.016701 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:49:00.016818 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:49:00.016838 kernel: PCI: CLS 0 bytes, default 64 May 10 00:49:00.016852 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:49:00.016865 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240933eba6e, max_idle_ns: 440795246008 ns May 10 00:49:00.016878 kernel: clocksource: Switched to clocksource tsc May 10 00:49:00.016891 kernel: Initialise system trusted keyrings May 10 00:49:00.016904 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:49:00.016917 kernel: Key type asymmetric registered May 10 00:49:00.016930 kernel: Asymmetric key parser 'x509' registered May 10 00:49:00.016942 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:49:00.016958 kernel: io scheduler mq-deadline registered May 10 00:49:00.016971 kernel: io scheduler kyber registered May 10 00:49:00.028364 kernel: io scheduler bfq registered May 10 00:49:00.028407 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:49:00.028421 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:49:00.028437 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:49:00.028453 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:49:00.028468 kernel: i8042: Warning: Keylock active May 10 00:49:00.028484 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:49:00.028507 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:49:00.028715 kernel: rtc_cmos 00:00: RTC can wake from S4 May 10 00:49:00.028838 kernel: rtc_cmos 00:00: registered as rtc0 May 10 00:49:00.028956 kernel: rtc_cmos 00:00: setting system clock to 2025-05-10T00:48:59 UTC (1746838139) May 10 00:49:00.029069 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 10 00:49:00.029088 kernel: intel_pstate: CPU model not supported May 10 00:49:00.029104 kernel: efifb: probing for efifb May 10 00:49:00.029119 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 10 00:49:00.029295 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 10 00:49:00.029312 kernel: efifb: scrolling: redraw May 10 00:49:00.029327 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:49:00.029341 kernel: Console: switching to colour frame buffer device 100x37 May 10 00:49:00.029354 kernel: fb0: EFI VGA frame buffer device May 10 00:49:00.029369 kernel: pstore: Registered efi as persistent store backend May 10 00:49:00.029408 kernel: NET: Registered PF_INET6 protocol family May 10 00:49:00.029426 kernel: Segment Routing with IPv6 May 10 00:49:00.029441 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:49:00.029458 kernel: NET: Registered PF_PACKET protocol family May 10 00:49:00.029473 kernel: Key type dns_resolver registered May 10 00:49:00.029488 kernel: IPI shorthand broadcast: enabled May 10 00:49:00.029503 kernel: sched_clock: Marking stable (374269129, 156797540)->(611018552, -79951883) May 10 00:49:00.029518 kernel: registered taskstats version 1 May 10 00:49:00.029531 kernel: Loading compiled-in X.509 certificates May 10 00:49:00.029546 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:49:00.029562 kernel: Key type .fscrypt registered May 10 00:49:00.029575 kernel: Key type fscrypt-provisioning registered May 10 00:49:00.029592 kernel: pstore: Using crash dump compression: deflate May 10 00:49:00.029608 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:49:00.029624 kernel: ima: Allocated hash algorithm: sha1 May 10 00:49:00.029640 kernel: ima: No architecture policies found May 10 00:49:00.029656 kernel: clk: Disabling unused clocks May 10 00:49:00.029672 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:49:00.029688 kernel: Write protecting the kernel read-only data: 28672k May 10 00:49:00.029704 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:49:00.029720 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:49:00.029739 kernel: Run /init as init process May 10 00:49:00.029755 kernel: with arguments: May 10 00:49:00.029771 kernel: /init May 10 00:49:00.029787 kernel: with environment: May 10 00:49:00.029802 kernel: HOME=/ May 10 00:49:00.029818 kernel: TERM=linux May 10 00:49:00.029834 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:49:00.029854 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:49:00.029877 systemd[1]: Detected virtualization amazon. May 10 00:49:00.029894 systemd[1]: Detected architecture x86-64. May 10 00:49:00.029911 systemd[1]: Running in initrd. May 10 00:49:00.029927 systemd[1]: No hostname configured, using default hostname. May 10 00:49:00.029943 systemd[1]: Hostname set to . May 10 00:49:00.029960 systemd[1]: Initializing machine ID from VM UUID. May 10 00:49:00.029977 systemd[1]: Queued start job for default target initrd.target. May 10 00:49:00.029996 systemd[1]: Started systemd-ask-password-console.path. May 10 00:49:00.030027 systemd[1]: Reached target cryptsetup.target. May 10 00:49:00.030043 systemd[1]: Reached target paths.target. May 10 00:49:00.030060 systemd[1]: Reached target slices.target. May 10 00:49:00.030077 systemd[1]: Reached target swap.target. May 10 00:49:00.030093 systemd[1]: Reached target timers.target. May 10 00:49:00.030114 systemd[1]: Listening on iscsid.socket. May 10 00:49:00.030131 systemd[1]: Listening on iscsiuio.socket. May 10 00:49:00.030159 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:49:00.030174 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:49:00.030187 systemd[1]: Listening on systemd-journald.socket. May 10 00:49:00.030200 systemd[1]: Listening on systemd-networkd.socket. May 10 00:49:00.030217 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:49:00.030234 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:49:00.030251 systemd[1]: Reached target sockets.target. May 10 00:49:00.030266 systemd[1]: Starting kmod-static-nodes.service... May 10 00:49:00.030302 systemd[1]: Finished network-cleanup.service. May 10 00:49:00.030316 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:49:00.030328 systemd[1]: Starting systemd-journald.service... May 10 00:49:00.030343 systemd[1]: Starting systemd-modules-load.service... May 10 00:49:00.030357 systemd[1]: Starting systemd-resolved.service... May 10 00:49:00.030371 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:49:00.030385 systemd[1]: Finished kmod-static-nodes.service. May 10 00:49:00.030403 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:49:00.030419 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:49:00.030435 kernel: audit: type=1130 audit(1746838140.007:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.030451 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:49:00.030467 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:49:00.030482 kernel: audit: type=1130 audit(1746838140.018:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.030505 systemd-journald[185]: Journal started May 10 00:49:00.030591 systemd-journald[185]: Runtime Journal (/run/log/journal/ec2ab486aa378dafcf1d677bfe9687c8) is 4.8M, max 38.3M, 33.5M free. May 10 00:49:00.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.002171 systemd-modules-load[186]: Inserted module 'overlay' May 10 00:49:00.060893 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:49:00.060934 systemd[1]: Started systemd-journald.service. May 10 00:49:00.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.075185 kernel: audit: type=1130 audit(1746838140.067:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.075841 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:49:00.083163 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:49:00.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.091810 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:49:00.093526 kernel: audit: type=1130 audit(1746838140.084:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.097566 systemd[1]: Starting dracut-cmdline.service... May 10 00:49:00.115511 kernel: Bridge firewalling registered May 10 00:49:00.115596 kernel: audit: type=1130 audit(1746838140.095:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.116657 systemd-modules-load[186]: Inserted module 'br_netfilter' May 10 00:49:00.118384 systemd-resolved[187]: Positive Trust Anchors: May 10 00:49:00.120260 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:49:00.123353 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:49:00.148289 kernel: audit: type=1130 audit(1746838140.138:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.148383 dracut-cmdline[203]: dracut-dracut-053 May 10 00:49:00.148383 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:00.135043 systemd-resolved[187]: Defaulting to hostname 'linux'. May 10 00:49:00.136287 systemd[1]: Started systemd-resolved.service. May 10 00:49:00.165709 kernel: SCSI subsystem initialized May 10 00:49:00.138697 systemd[1]: Reached target nss-lookup.target. May 10 00:49:00.189635 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:49:00.189707 kernel: device-mapper: uevent: version 1.0.3 May 10 00:49:00.192760 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:49:00.197268 systemd-modules-load[186]: Inserted module 'dm_multipath' May 10 00:49:00.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.200094 systemd[1]: Finished systemd-modules-load.service. May 10 00:49:00.212271 kernel: audit: type=1130 audit(1746838140.201:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.212038 systemd[1]: Starting systemd-sysctl.service... May 10 00:49:00.221565 systemd[1]: Finished systemd-sysctl.service. May 10 00:49:00.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.232182 kernel: audit: type=1130 audit(1746838140.222:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.236161 kernel: Loading iSCSI transport class v2.0-870. May 10 00:49:00.256177 kernel: iscsi: registered transport (tcp) May 10 00:49:00.281824 kernel: iscsi: registered transport (qla4xxx) May 10 00:49:00.281907 kernel: QLogic iSCSI HBA Driver May 10 00:49:00.322066 systemd[1]: Finished dracut-cmdline.service. May 10 00:49:00.324253 systemd[1]: Starting dracut-pre-udev.service... May 10 00:49:00.333095 kernel: audit: type=1130 audit(1746838140.322:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:00.382234 kernel: raid6: avx512x4 gen() 17431 MB/s May 10 00:49:00.400243 kernel: raid6: avx512x4 xor() 7053 MB/s May 10 00:49:00.418202 kernel: raid6: avx512x2 gen() 15858 MB/s May 10 00:49:00.436207 kernel: raid6: avx512x2 xor() 17108 MB/s May 10 00:49:00.454256 kernel: raid6: avx512x1 gen() 16530 MB/s May 10 00:49:00.472204 kernel: raid6: avx512x1 xor() 20759 MB/s May 10 00:49:00.490201 kernel: raid6: avx2x4 gen() 15928 MB/s May 10 00:49:00.508288 kernel: raid6: avx2x4 xor() 5474 MB/s May 10 00:49:00.526207 kernel: raid6: avx2x2 gen() 16710 MB/s May 10 00:49:00.544198 kernel: raid6: avx2x2 xor() 17774 MB/s May 10 00:49:00.562197 kernel: raid6: avx2x1 gen() 12824 MB/s May 10 00:49:00.580185 kernel: raid6: avx2x1 xor() 14759 MB/s May 10 00:49:00.598175 kernel: raid6: sse2x4 gen() 8843 MB/s May 10 00:49:00.616184 kernel: raid6: sse2x4 xor() 5044 MB/s May 10 00:49:00.638749 kernel: raid6: sse2x2 gen() 5040 MB/s May 10 00:49:00.657290 kernel: raid6: sse2x2 xor() 3090 MB/s May 10 00:49:00.675198 kernel: raid6: sse2x1 gen() 3947 MB/s May 10 00:49:00.694181 kernel: raid6: sse2x1 xor() 2143 MB/s May 10 00:49:00.694260 kernel: raid6: using algorithm avx512x4 gen() 17431 MB/s May 10 00:49:00.694280 kernel: raid6: .... xor() 7053 MB/s, rmw enabled May 10 00:49:00.697498 kernel: raid6: using avx512x2 recovery algorithm May 10 00:49:00.765842 kernel: xor: automatically using best checksumming function avx May 10 00:49:01.030242 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:49:01.040507 systemd[1]: Finished dracut-pre-udev.service. May 10 00:49:01.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:01.041000 audit: BPF prog-id=7 op=LOAD May 10 00:49:01.041000 audit: BPF prog-id=8 op=LOAD May 10 00:49:01.042315 systemd[1]: Starting systemd-udevd.service... May 10 00:49:01.058459 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 10 00:49:01.064043 systemd[1]: Started systemd-udevd.service. May 10 00:49:01.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:01.071046 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:49:01.094318 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation May 10 00:49:01.138735 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:49:01.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:01.140445 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:49:01.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:01.288398 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:49:01.349158 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:49:01.377983 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:49:01.378081 kernel: AES CTR mode by8 optimization enabled May 10 00:49:01.382160 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 10 00:49:01.401799 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 10 00:49:01.401971 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 10 00:49:01.402132 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:ee:9b:7e:3a:63 May 10 00:49:01.403099 (udev-worker)[437]: Network interface NamePolicy= disabled on kernel command line. May 10 00:49:01.409610 kernel: nvme nvme0: pci function 0000:00:04.0 May 10 00:49:01.409877 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:49:01.422177 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 10 00:49:01.430787 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:49:01.430847 kernel: GPT:9289727 != 16777215 May 10 00:49:01.430873 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:49:01.432455 kernel: GPT:9289727 != 16777215 May 10 00:49:01.433485 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:49:01.436036 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:01.509164 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (440) May 10 00:49:01.561250 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:49:01.587188 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:49:01.598332 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:49:01.608440 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:49:01.609239 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:49:01.611802 systemd[1]: Starting disk-uuid.service... May 10 00:49:01.619481 disk-uuid[594]: Primary Header is updated. May 10 00:49:01.619481 disk-uuid[594]: Secondary Entries is updated. May 10 00:49:01.619481 disk-uuid[594]: Secondary Header is updated. May 10 00:49:01.628190 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:01.635183 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:02.636708 disk-uuid[595]: The operation has completed successfully. May 10 00:49:02.638345 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:02.762863 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:49:02.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:02.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:02.763004 systemd[1]: Finished disk-uuid.service. May 10 00:49:02.765053 systemd[1]: Starting verity-setup.service... May 10 00:49:02.796164 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:49:02.896337 systemd[1]: Found device dev-mapper-usr.device. May 10 00:49:02.898956 systemd[1]: Mounting sysusr-usr.mount... May 10 00:49:02.902556 systemd[1]: Finished verity-setup.service. May 10 00:49:02.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:02.995194 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:49:02.995598 systemd[1]: Mounted sysusr-usr.mount. May 10 00:49:02.996511 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:49:02.997305 systemd[1]: Starting ignition-setup.service... May 10 00:49:03.004353 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:49:03.028481 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:03.028561 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:49:03.028582 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:49:03.055169 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:49:03.069506 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:49:03.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.081968 systemd[1]: Finished ignition-setup.service. May 10 00:49:03.085947 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:49:03.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.091000 audit: BPF prog-id=9 op=LOAD May 10 00:49:03.089542 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:49:03.092426 systemd[1]: Starting systemd-networkd.service... May 10 00:49:03.119269 systemd-networkd[1023]: lo: Link UP May 10 00:49:03.119281 systemd-networkd[1023]: lo: Gained carrier May 10 00:49:03.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.119927 systemd-networkd[1023]: Enumeration completed May 10 00:49:03.120058 systemd[1]: Started systemd-networkd.service. May 10 00:49:03.120371 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:49:03.122824 systemd[1]: Reached target network.target. May 10 00:49:03.123698 systemd-networkd[1023]: eth0: Link UP May 10 00:49:03.123703 systemd-networkd[1023]: eth0: Gained carrier May 10 00:49:03.126774 systemd[1]: Starting iscsiuio.service... May 10 00:49:03.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.135163 systemd[1]: Started iscsiuio.service. May 10 00:49:03.137211 systemd[1]: Starting iscsid.service... May 10 00:49:03.138261 systemd-networkd[1023]: eth0: DHCPv4 address 172.31.21.73/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:49:03.144951 iscsid[1028]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:49:03.144951 iscsid[1028]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:49:03.144951 iscsid[1028]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:49:03.144951 iscsid[1028]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:49:03.144951 iscsid[1028]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:49:03.144951 iscsid[1028]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:49:03.144951 iscsid[1028]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:49:03.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.145044 systemd[1]: Started iscsid.service. May 10 00:49:03.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.147322 systemd[1]: Starting dracut-initqueue.service... May 10 00:49:03.165411 systemd[1]: Finished dracut-initqueue.service. May 10 00:49:03.166765 systemd[1]: Reached target remote-fs-pre.target. May 10 00:49:03.168210 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:49:03.168878 systemd[1]: Reached target remote-fs.target. May 10 00:49:03.170770 systemd[1]: Starting dracut-pre-mount.service... May 10 00:49:03.183118 systemd[1]: Finished dracut-pre-mount.service. May 10 00:49:03.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.571965 ignition[1019]: Ignition 2.14.0 May 10 00:49:03.571980 ignition[1019]: Stage: fetch-offline May 10 00:49:03.572136 ignition[1019]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:03.572196 ignition[1019]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:03.594367 ignition[1019]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:03.595097 ignition[1019]: Ignition finished successfully May 10 00:49:03.596400 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:49:03.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.598904 systemd[1]: Starting ignition-fetch.service... May 10 00:49:03.609126 ignition[1047]: Ignition 2.14.0 May 10 00:49:03.609151 ignition[1047]: Stage: fetch May 10 00:49:03.609364 ignition[1047]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:03.609503 ignition[1047]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:03.617761 ignition[1047]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:03.619493 ignition[1047]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:03.627257 ignition[1047]: INFO : PUT result: OK May 10 00:49:03.628973 ignition[1047]: DEBUG : parsed url from cmdline: "" May 10 00:49:03.628973 ignition[1047]: INFO : no config URL provided May 10 00:49:03.628973 ignition[1047]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 10 00:49:03.628973 ignition[1047]: INFO : no config at "/usr/lib/ignition/user.ign" May 10 00:49:03.628973 ignition[1047]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:03.634672 ignition[1047]: INFO : PUT result: OK May 10 00:49:03.634672 ignition[1047]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 10 00:49:03.634672 ignition[1047]: INFO : GET result: OK May 10 00:49:03.634672 ignition[1047]: DEBUG : parsing config with SHA512: 04ec570dee42215dddfd4b6db38f177fe9b50adddbd831491eaae53076aa390c57b3ac672b7fd1678adac12a8b46bf00f0f68c4db52a08575d6583f0b8338ae7 May 10 00:49:03.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.638228 unknown[1047]: fetched base config from "system" May 10 00:49:03.638996 ignition[1047]: fetch: fetch complete May 10 00:49:03.638241 unknown[1047]: fetched base config from "system" May 10 00:49:03.639001 ignition[1047]: fetch: fetch passed May 10 00:49:03.638251 unknown[1047]: fetched user config from "aws" May 10 00:49:03.639044 ignition[1047]: Ignition finished successfully May 10 00:49:03.640660 systemd[1]: Finished ignition-fetch.service. May 10 00:49:03.642930 systemd[1]: Starting ignition-kargs.service... May 10 00:49:03.655866 ignition[1053]: Ignition 2.14.0 May 10 00:49:03.655881 ignition[1053]: Stage: kargs May 10 00:49:03.656090 ignition[1053]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:03.656124 ignition[1053]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:03.664615 ignition[1053]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:03.665624 ignition[1053]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:03.666790 ignition[1053]: INFO : PUT result: OK May 10 00:49:03.668579 ignition[1053]: kargs: kargs passed May 10 00:49:03.668648 ignition[1053]: Ignition finished successfully May 10 00:49:03.670181 systemd[1]: Finished ignition-kargs.service. May 10 00:49:03.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.672432 systemd[1]: Starting ignition-disks.service... May 10 00:49:03.681567 ignition[1059]: Ignition 2.14.0 May 10 00:49:03.681580 ignition[1059]: Stage: disks May 10 00:49:03.681790 ignition[1059]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:03.681824 ignition[1059]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:03.689793 ignition[1059]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:03.690960 ignition[1059]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:03.690960 ignition[1059]: INFO : PUT result: OK May 10 00:49:03.693603 ignition[1059]: disks: disks passed May 10 00:49:03.693673 ignition[1059]: Ignition finished successfully May 10 00:49:03.695042 systemd[1]: Finished ignition-disks.service. May 10 00:49:03.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.696379 systemd[1]: Reached target initrd-root-device.target. May 10 00:49:03.697480 systemd[1]: Reached target local-fs-pre.target. May 10 00:49:03.698706 systemd[1]: Reached target local-fs.target. May 10 00:49:03.699833 systemd[1]: Reached target sysinit.target. May 10 00:49:03.700913 systemd[1]: Reached target basic.target. May 10 00:49:03.703358 systemd[1]: Starting systemd-fsck-root.service... May 10 00:49:03.733513 systemd-fsck[1067]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:49:03.736389 systemd[1]: Finished systemd-fsck-root.service. May 10 00:49:03.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.737965 systemd[1]: Mounting sysroot.mount... May 10 00:49:03.756177 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:49:03.756365 systemd[1]: Mounted sysroot.mount. May 10 00:49:03.757518 systemd[1]: Reached target initrd-root-fs.target. May 10 00:49:03.766680 systemd[1]: Mounting sysroot-usr.mount... May 10 00:49:03.767844 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:49:03.767888 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:49:03.767916 systemd[1]: Reached target ignition-diskful.target. May 10 00:49:03.770532 systemd[1]: Mounted sysroot-usr.mount. May 10 00:49:03.774180 systemd[1]: Starting initrd-setup-root.service... May 10 00:49:03.787942 initrd-setup-root[1088]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:49:03.817013 initrd-setup-root[1096]: cut: /sysroot/etc/group: No such file or directory May 10 00:49:03.821392 initrd-setup-root[1104]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:49:03.825497 initrd-setup-root[1112]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:49:03.925665 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:49:03.946172 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1120) May 10 00:49:03.951420 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:03.951524 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:49:03.951544 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:49:03.974214 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:49:03.985179 systemd[1]: Finished initrd-setup-root.service. May 10 00:49:03.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:03.986388 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:49:03.989225 systemd[1]: Starting ignition-mount.service... May 10 00:49:03.993263 systemd[1]: Starting sysroot-boot.service... May 10 00:49:03.997792 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 00:49:03.997891 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 00:49:04.016624 ignition[1149]: INFO : Ignition 2.14.0 May 10 00:49:04.018202 ignition[1149]: INFO : Stage: mount May 10 00:49:04.019717 ignition[1149]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:04.022227 ignition[1149]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:04.034674 ignition[1149]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:04.036361 ignition[1149]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:04.039154 systemd[1]: Finished sysroot-boot.service. May 10 00:49:04.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:04.041090 ignition[1149]: INFO : PUT result: OK May 10 00:49:04.044190 ignition[1149]: INFO : mount: mount passed May 10 00:49:04.045223 ignition[1149]: INFO : Ignition finished successfully May 10 00:49:04.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:04.046257 systemd[1]: Finished ignition-mount.service. May 10 00:49:04.047742 systemd[1]: Starting ignition-files.service... May 10 00:49:04.055677 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:49:04.074167 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1159) May 10 00:49:04.078321 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:04.078392 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:49:04.078406 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:49:04.117180 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:49:04.121181 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:49:04.132958 ignition[1178]: INFO : Ignition 2.14.0 May 10 00:49:04.132958 ignition[1178]: INFO : Stage: files May 10 00:49:04.135838 ignition[1178]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:04.135838 ignition[1178]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:04.143132 ignition[1178]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:04.144190 ignition[1178]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:04.145182 ignition[1178]: INFO : PUT result: OK May 10 00:49:04.147747 ignition[1178]: DEBUG : files: compiled without relabeling support, skipping May 10 00:49:04.152995 ignition[1178]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:49:04.152995 ignition[1178]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:49:04.157445 ignition[1178]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:49:04.157445 ignition[1178]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:49:04.161157 ignition[1178]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:49:04.158628 unknown[1178]: wrote ssh authorized keys file for user: core May 10 00:49:04.166486 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" May 10 00:49:04.168176 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" May 10 00:49:04.168176 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:49:04.168176 ignition[1178]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:49:04.267960 ignition[1178]: INFO : GET result: OK May 10 00:49:05.139270 systemd-networkd[1023]: eth0: Gained IPv6LL May 10 00:49:05.210937 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:49:05.210937 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:49:05.214308 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:49:05.214308 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:49:05.214308 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:49:05.214308 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:49:05.214308 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:05.224100 ignition[1178]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3531442945" May 10 00:49:05.224100 ignition[1178]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3531442945": device or resource busy May 10 00:49:05.224100 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3531442945", trying btrfs: device or resource busy May 10 00:49:05.224100 ignition[1178]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3531442945" May 10 00:49:05.224100 ignition[1178]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3531442945" May 10 00:49:05.238754 ignition[1178]: INFO : op(3): [started] unmounting "/mnt/oem3531442945" May 10 00:49:05.238754 ignition[1178]: INFO : op(3): [finished] unmounting "/mnt/oem3531442945" May 10 00:49:05.238754 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:49:05.243134 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:49:05.243134 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:05.239872 systemd[1]: mnt-oem3531442945.mount: Deactivated successfully. May 10 00:49:05.261406 ignition[1178]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3154387433" May 10 00:49:05.261406 ignition[1178]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3154387433": device or resource busy May 10 00:49:05.261406 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3154387433", trying btrfs: device or resource busy May 10 00:49:05.261406 ignition[1178]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3154387433" May 10 00:49:05.261406 ignition[1178]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3154387433" May 10 00:49:05.261406 ignition[1178]: INFO : op(6): [started] unmounting "/mnt/oem3154387433" May 10 00:49:05.261406 ignition[1178]: INFO : op(6): [finished] unmounting "/mnt/oem3154387433" May 10 00:49:05.261406 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:49:05.261406 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:49:05.261406 ignition[1178]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:49:05.588668 ignition[1178]: INFO : GET result: OK May 10 00:49:05.956358 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:49:05.956358 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:49:05.963482 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:05.968028 ignition[1178]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985611238" May 10 00:49:05.968028 ignition[1178]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985611238": device or resource busy May 10 00:49:05.968028 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2985611238", trying btrfs: device or resource busy May 10 00:49:05.968028 ignition[1178]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985611238" May 10 00:49:05.981911 ignition[1178]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2985611238" May 10 00:49:05.981911 ignition[1178]: INFO : op(9): [started] unmounting "/mnt/oem2985611238" May 10 00:49:05.981911 ignition[1178]: INFO : op(9): [finished] unmounting "/mnt/oem2985611238" May 10 00:49:05.981911 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:49:05.981911 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:49:05.981911 ignition[1178]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:05.976023 systemd[1]: mnt-oem2985611238.mount: Deactivated successfully. May 10 00:49:06.002519 ignition[1178]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem615425459" May 10 00:49:06.002519 ignition[1178]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem615425459": device or resource busy May 10 00:49:06.002519 ignition[1178]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem615425459", trying btrfs: device or resource busy May 10 00:49:06.002519 ignition[1178]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem615425459" May 10 00:49:06.002519 ignition[1178]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem615425459" May 10 00:49:06.002519 ignition[1178]: INFO : op(c): [started] unmounting "/mnt/oem615425459" May 10 00:49:06.002519 ignition[1178]: INFO : op(c): [finished] unmounting "/mnt/oem615425459" May 10 00:49:06.002519 ignition[1178]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(10): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(11): [started] processing unit "amazon-ssm-agent.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(11): op(12): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(11): op(12): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(11): [finished] processing unit "amazon-ssm-agent.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(13): [started] processing unit "nvidia.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(13): [finished] processing unit "nvidia.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(14): [started] processing unit "containerd.service" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(14): op(15): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(14): op(15): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" May 10 00:49:06.002519 ignition[1178]: INFO : files: op(14): [finished] processing unit "containerd.service" May 10 00:49:06.106225 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:49:06.106263 kernel: audit: type=1130 audit(1746838146.013:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.106284 kernel: audit: type=1130 audit(1746838146.034:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.106309 kernel: audit: type=1131 audit(1746838146.035:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.106329 kernel: audit: type=1130 audit(1746838146.049:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.106351 kernel: audit: type=1130 audit(1746838146.083:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.106370 kernel: audit: type=1131 audit(1746838146.083:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.106680 ignition[1178]: INFO : files: op(16): [started] processing unit "prepare-helm.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(16): op(17): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(16): op(17): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(16): [finished] processing unit "prepare-helm.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:49:06.106680 ignition[1178]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:49:06.106680 ignition[1178]: INFO : files: op(19): [started] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(19): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(1a): [started] setting preset to enabled for "nvidia.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(1a): [finished] setting preset to enabled for "nvidia.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-helm.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:49:06.106680 ignition[1178]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:49:06.106680 ignition[1178]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:49:06.106680 ignition[1178]: INFO : files: files passed May 10 00:49:06.106680 ignition[1178]: INFO : Ignition finished successfully May 10 00:49:06.179821 kernel: audit: type=1130 audit(1746838146.122:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.179858 kernel: audit: type=1130 audit(1746838146.147:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.179888 kernel: audit: type=1131 audit(1746838146.147:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.179907 kernel: audit: type=1131 audit(1746838146.169:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.011657 systemd[1]: Finished ignition-files.service. May 10 00:49:06.022491 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:49:06.183273 initrd-setup-root-after-ignition[1203]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:49:06.027931 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:49:06.029196 systemd[1]: Starting ignition-quench.service... May 10 00:49:06.033601 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:49:06.033746 systemd[1]: Finished ignition-quench.service. May 10 00:49:06.045890 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:49:06.050285 systemd[1]: Reached target ignition-complete.target. May 10 00:49:06.059664 systemd[1]: Starting initrd-parse-etc.service... May 10 00:49:06.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.082025 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:49:06.082166 systemd[1]: Finished initrd-parse-etc.service. May 10 00:49:06.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.083795 systemd[1]: Reached target initrd-fs.target. May 10 00:49:06.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.096914 systemd[1]: Reached target initrd.target. May 10 00:49:06.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.099800 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:49:06.101075 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:49:06.120481 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:49:06.124197 systemd[1]: Starting initrd-cleanup.service... May 10 00:49:06.145024 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:49:06.145169 systemd[1]: Finished initrd-cleanup.service. May 10 00:49:06.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.226121 ignition[1216]: INFO : Ignition 2.14.0 May 10 00:49:06.226121 ignition[1216]: INFO : Stage: umount May 10 00:49:06.148741 systemd[1]: Stopped target nss-lookup.target. May 10 00:49:06.233245 ignition[1216]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:06.233245 ignition[1216]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:06.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.161385 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:49:06.164309 systemd[1]: Stopped target timers.target. May 10 00:49:06.166862 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:49:06.166954 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:49:06.169587 systemd[1]: Stopped target initrd.target. May 10 00:49:06.177355 systemd[1]: Stopped target basic.target. May 10 00:49:06.252726 ignition[1216]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:06.252726 ignition[1216]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:06.252726 ignition[1216]: INFO : PUT result: OK May 10 00:49:06.179011 systemd[1]: Stopped target ignition-complete.target. May 10 00:49:06.257389 ignition[1216]: INFO : umount: umount passed May 10 00:49:06.257389 ignition[1216]: INFO : Ignition finished successfully May 10 00:49:06.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.180754 systemd[1]: Stopped target ignition-diskful.target. May 10 00:49:06.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.182488 systemd[1]: Stopped target initrd-root-device.target. May 10 00:49:06.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.184068 systemd[1]: Stopped target remote-fs.target. May 10 00:49:06.186632 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:49:06.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.189521 systemd[1]: Stopped target sysinit.target. May 10 00:49:06.191115 systemd[1]: Stopped target local-fs.target. May 10 00:49:06.192644 systemd[1]: Stopped target local-fs-pre.target. May 10 00:49:06.194235 systemd[1]: Stopped target swap.target. May 10 00:49:06.195746 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:49:06.195824 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:49:06.197371 systemd[1]: Stopped target cryptsetup.target. May 10 00:49:06.198888 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:49:06.198961 systemd[1]: Stopped dracut-initqueue.service. May 10 00:49:06.200499 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:49:06.200562 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:49:06.202051 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:49:06.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.202116 systemd[1]: Stopped ignition-files.service. May 10 00:49:06.204524 systemd[1]: Stopping ignition-mount.service... May 10 00:49:06.206676 systemd[1]: Stopping iscsiuio.service... May 10 00:49:06.217315 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:49:06.217409 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:49:06.220593 systemd[1]: Stopping sysroot-boot.service... May 10 00:49:06.222750 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:49:06.222833 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:49:06.224482 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:49:06.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.224559 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:49:06.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.235286 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:49:06.235423 systemd[1]: Stopped iscsiuio.service. May 10 00:49:06.295000 audit: BPF prog-id=6 op=UNLOAD May 10 00:49:06.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.246227 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:49:06.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.256978 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:49:06.257101 systemd[1]: Stopped ignition-mount.service. May 10 00:49:06.258586 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:49:06.258654 systemd[1]: Stopped ignition-disks.service. May 10 00:49:06.259920 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:49:06.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.259984 systemd[1]: Stopped ignition-kargs.service. May 10 00:49:06.261414 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:49:06.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.261475 systemd[1]: Stopped ignition-fetch.service. May 10 00:49:06.262872 systemd[1]: Stopped target network.target. May 10 00:49:06.264103 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:49:06.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.264197 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:49:06.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.265500 systemd[1]: Stopped target paths.target. May 10 00:49:06.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.266826 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:49:06.270200 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:49:06.272009 systemd[1]: Stopped target slices.target. May 10 00:49:06.273245 systemd[1]: Stopped target sockets.target. May 10 00:49:06.275035 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:49:06.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.275080 systemd[1]: Closed iscsid.socket. May 10 00:49:06.276279 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:49:06.276333 systemd[1]: Closed iscsiuio.socket. May 10 00:49:06.277524 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:49:06.277595 systemd[1]: Stopped ignition-setup.service. May 10 00:49:06.279096 systemd[1]: Stopping systemd-networkd.service... May 10 00:49:06.280496 systemd[1]: Stopping systemd-resolved.service... May 10 00:49:06.283207 systemd-networkd[1023]: eth0: DHCPv6 lease lost May 10 00:49:06.339000 audit: BPF prog-id=9 op=UNLOAD May 10 00:49:06.284944 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:49:06.285072 systemd[1]: Stopped systemd-networkd.service. May 10 00:49:06.290638 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:49:06.290765 systemd[1]: Stopped systemd-resolved.service. May 10 00:49:06.292055 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:49:06.292100 systemd[1]: Closed systemd-networkd.socket. May 10 00:49:06.294566 systemd[1]: Stopping network-cleanup.service... May 10 00:49:06.295381 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:49:06.295462 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:49:06.296703 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:49:06.296770 systemd[1]: Stopped systemd-sysctl.service. May 10 00:49:06.299663 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:49:06.299709 systemd[1]: Stopped systemd-modules-load.service. May 10 00:49:06.300826 systemd[1]: Stopping systemd-udevd.service... May 10 00:49:06.306489 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:49:06.311850 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:49:06.311953 systemd[1]: Stopped network-cleanup.service. May 10 00:49:06.314479 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:49:06.314608 systemd[1]: Stopped systemd-udevd.service. May 10 00:49:06.315830 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:49:06.315881 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:49:06.317059 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:49:06.317107 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:49:06.318537 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:49:06.318598 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:49:06.319835 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:49:06.319890 systemd[1]: Stopped dracut-cmdline.service. May 10 00:49:06.321173 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:49:06.321228 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:49:06.323533 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:49:06.326041 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:49:06.326124 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:49:06.333453 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:49:06.333558 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:49:06.393582 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:49:06.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.393694 systemd[1]: Stopped sysroot-boot.service. May 10 00:49:06.394884 systemd[1]: Reached target initrd-switch-root.target. May 10 00:49:06.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.396387 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:49:06.396455 systemd[1]: Stopped initrd-setup-root.service. May 10 00:49:06.398810 systemd[1]: Starting initrd-switch-root.service... May 10 00:49:06.420732 systemd[1]: Switching root. May 10 00:49:06.426000 audit: BPF prog-id=5 op=UNLOAD May 10 00:49:06.426000 audit: BPF prog-id=4 op=UNLOAD May 10 00:49:06.426000 audit: BPF prog-id=3 op=UNLOAD May 10 00:49:06.427000 audit: BPF prog-id=8 op=UNLOAD May 10 00:49:06.427000 audit: BPF prog-id=7 op=UNLOAD May 10 00:49:06.440463 systemd-journald[185]: Journal stopped May 10 00:49:11.657438 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 10 00:49:11.657532 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:49:11.657562 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:49:11.657583 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:49:11.657603 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:49:11.657622 kernel: SELinux: policy capability open_perms=1 May 10 00:49:11.657648 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:49:11.657677 kernel: SELinux: policy capability always_check_network=0 May 10 00:49:11.657700 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:49:11.657719 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:49:11.657738 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:49:11.657758 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:49:11.657784 systemd[1]: Successfully loaded SELinux policy in 98.112ms. May 10 00:49:11.657817 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.596ms. May 10 00:49:11.657840 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:49:11.657863 systemd[1]: Detected virtualization amazon. May 10 00:49:11.657887 systemd[1]: Detected architecture x86-64. May 10 00:49:11.657908 systemd[1]: Detected first boot. May 10 00:49:11.657946 systemd[1]: Initializing machine ID from VM UUID. May 10 00:49:11.657967 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:49:11.657988 systemd[1]: Populated /etc with preset unit settings. May 10 00:49:11.658010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:11.658033 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:11.658059 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:11.658080 systemd[1]: Queued start job for default target multi-user.target. May 10 00:49:11.658101 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 10 00:49:11.658122 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:49:11.658155 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:49:11.658176 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:49:11.658197 systemd[1]: Created slice system-getty.slice. May 10 00:49:11.658218 systemd[1]: Created slice system-modprobe.slice. May 10 00:49:11.658241 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:49:11.658265 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:49:11.658286 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:49:11.658314 systemd[1]: Created slice user.slice. May 10 00:49:11.658334 systemd[1]: Started systemd-ask-password-console.path. May 10 00:49:11.658357 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:49:11.658379 systemd[1]: Set up automount boot.automount. May 10 00:49:11.658402 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:49:11.658424 systemd[1]: Reached target integritysetup.target. May 10 00:49:11.658447 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:49:11.658469 systemd[1]: Reached target remote-fs.target. May 10 00:49:11.658490 systemd[1]: Reached target slices.target. May 10 00:49:11.658512 systemd[1]: Reached target swap.target. May 10 00:49:11.658533 systemd[1]: Reached target torcx.target. May 10 00:49:11.658554 systemd[1]: Reached target veritysetup.target. May 10 00:49:11.658575 systemd[1]: Listening on systemd-coredump.socket. May 10 00:49:11.658596 systemd[1]: Listening on systemd-initctl.socket. May 10 00:49:11.658618 kernel: kauditd_printk_skb: 47 callbacks suppressed May 10 00:49:11.658649 kernel: audit: type=1400 audit(1746838151.429:86): avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:49:11.658672 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:49:11.658693 kernel: audit: type=1335 audit(1746838151.429:87): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 10 00:49:11.658719 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:49:11.658740 systemd[1]: Listening on systemd-journald.socket. May 10 00:49:11.658761 systemd[1]: Listening on systemd-networkd.socket. May 10 00:49:11.658782 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:49:11.658803 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:49:11.658826 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:49:11.658849 systemd[1]: Mounting dev-hugepages.mount... May 10 00:49:11.658870 systemd[1]: Mounting dev-mqueue.mount... May 10 00:49:11.658893 systemd[1]: Mounting media.mount... May 10 00:49:11.658917 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:11.658939 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:49:11.658961 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:49:11.658982 systemd[1]: Mounting tmp.mount... May 10 00:49:11.659005 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:49:11.659026 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:11.659045 systemd[1]: Starting kmod-static-nodes.service... May 10 00:49:11.659063 systemd[1]: Starting modprobe@configfs.service... May 10 00:49:11.659082 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:11.659103 systemd[1]: Starting modprobe@drm.service... May 10 00:49:11.659122 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:11.674187 systemd[1]: Starting modprobe@fuse.service... May 10 00:49:11.674237 systemd[1]: Starting modprobe@loop.service... May 10 00:49:11.674259 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:49:11.674279 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. May 10 00:49:11.674300 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) May 10 00:49:11.674319 systemd[1]: Starting systemd-journald.service... May 10 00:49:11.674337 systemd[1]: Starting systemd-modules-load.service... May 10 00:49:11.674362 systemd[1]: Starting systemd-network-generator.service... May 10 00:49:11.674380 kernel: loop: module loaded May 10 00:49:11.674399 systemd[1]: Starting systemd-remount-fs.service... May 10 00:49:11.674418 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:49:11.674437 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:11.674457 systemd[1]: Mounted dev-hugepages.mount. May 10 00:49:11.674476 systemd[1]: Mounted dev-mqueue.mount. May 10 00:49:11.674495 systemd[1]: Mounted media.mount. May 10 00:49:11.674513 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:49:11.674534 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:49:11.674554 systemd[1]: Mounted tmp.mount. May 10 00:49:11.674573 kernel: audit: type=1305 audit(1746838151.655:88): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:49:11.674592 kernel: audit: type=1300 audit(1746838151.655:88): arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffecd8720d0 a2=4000 a3=7ffecd87216c items=0 ppid=1 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:11.674609 kernel: audit: type=1327 audit(1746838151.655:88): proctitle="/usr/lib/systemd/systemd-journald" May 10 00:49:11.674633 systemd-journald[1370]: Journal started May 10 00:49:11.674707 systemd-journald[1370]: Runtime Journal (/run/log/journal/ec2ab486aa378dafcf1d677bfe9687c8) is 4.8M, max 38.3M, 33.5M free. May 10 00:49:11.429000 audit[1]: AVC avc: denied { audit_read } for pid=1 comm="systemd" capability=37 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:49:11.429000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 May 10 00:49:11.655000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:49:11.655000 audit[1370]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffecd8720d0 a2=4000 a3=7ffecd87216c items=0 ppid=1 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:11.655000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:49:11.684356 systemd[1]: Started systemd-journald.service. May 10 00:49:11.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.687408 systemd[1]: Finished kmod-static-nodes.service. May 10 00:49:11.694197 kernel: audit: type=1130 audit(1746838151.685:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.695382 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:49:11.695620 systemd[1]: Finished modprobe@configfs.service. May 10 00:49:11.702195 kernel: audit: type=1130 audit(1746838151.694:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.704423 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:11.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.705909 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:11.714160 kernel: audit: type=1130 audit(1746838151.703:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.715221 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:49:11.715516 systemd[1]: Finished modprobe@drm.service. May 10 00:49:11.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.717500 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:11.724189 kernel: audit: type=1131 audit(1746838151.703:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.724234 kernel: fuse: init (API version 7.34) May 10 00:49:11.717766 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:11.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.731224 kernel: audit: type=1130 audit(1746838151.714:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.737641 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:49:11.737875 systemd[1]: Finished modprobe@fuse.service. May 10 00:49:11.739923 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:11.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.742408 systemd[1]: Finished modprobe@loop.service. May 10 00:49:11.746424 systemd[1]: Finished systemd-modules-load.service. May 10 00:49:11.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.752810 systemd[1]: Finished systemd-network-generator.service. May 10 00:49:11.755243 systemd[1]: Finished systemd-remount-fs.service. May 10 00:49:11.757395 systemd[1]: Reached target network-pre.target. May 10 00:49:11.763104 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:49:11.768846 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:49:11.773512 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:49:11.779645 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:49:11.782757 systemd[1]: Starting systemd-journal-flush.service... May 10 00:49:11.786408 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:11.788596 systemd[1]: Starting systemd-random-seed.service... May 10 00:49:11.790516 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:11.792658 systemd[1]: Starting systemd-sysctl.service... May 10 00:49:11.796519 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:49:11.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.804620 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:49:11.806877 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:49:11.811490 systemd[1]: Starting systemd-sysusers.service... May 10 00:49:11.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.818880 systemd[1]: Finished systemd-random-seed.service. May 10 00:49:11.820403 systemd[1]: Reached target first-boot-complete.target. May 10 00:49:11.831660 systemd-journald[1370]: Time spent on flushing to /var/log/journal/ec2ab486aa378dafcf1d677bfe9687c8 is 41.050ms for 1163 entries. May 10 00:49:11.831660 systemd-journald[1370]: System Journal (/var/log/journal/ec2ab486aa378dafcf1d677bfe9687c8) is 8.0M, max 195.6M, 187.6M free. May 10 00:49:11.887828 systemd-journald[1370]: Received client request to flush runtime journal. May 10 00:49:11.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.838705 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:49:11.841733 systemd[1]: Starting systemd-udev-settle.service... May 10 00:49:11.890811 udevadm[1416]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:49:11.876228 systemd[1]: Finished systemd-sysctl.service. May 10 00:49:11.889009 systemd[1]: Finished systemd-journal-flush.service. May 10 00:49:11.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:11.940877 systemd[1]: Finished systemd-sysusers.service. May 10 00:49:11.943763 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:49:12.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.006674 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:49:12.427259 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:49:12.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.429038 systemd[1]: Starting systemd-udevd.service... May 10 00:49:12.448725 systemd-udevd[1425]: Using default interface naming scheme 'v252'. May 10 00:49:12.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.484729 systemd[1]: Started systemd-udevd.service. May 10 00:49:12.487131 systemd[1]: Starting systemd-networkd.service... May 10 00:49:12.504346 systemd[1]: Starting systemd-userdbd.service... May 10 00:49:12.530941 systemd[1]: Found device dev-ttyS0.device. May 10 00:49:12.540364 (udev-worker)[1428]: Network interface NamePolicy= disabled on kernel command line. May 10 00:49:12.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.551971 systemd[1]: Started systemd-userdbd.service. May 10 00:49:12.592184 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:49:12.620162 kernel: ACPI: button: Power Button [PWRF] May 10 00:49:12.625171 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 10 00:49:12.628064 systemd-networkd[1435]: lo: Link UP May 10 00:49:12.628073 systemd-networkd[1435]: lo: Gained carrier May 10 00:49:12.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.616000 audit[1434]: AVC avc: denied { confidentiality } for pid=1434 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:49:12.629332 systemd-networkd[1435]: Enumeration completed May 10 00:49:12.629460 systemd[1]: Started systemd-networkd.service. May 10 00:49:12.631339 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:49:12.631766 systemd-networkd[1435]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:49:12.632710 kernel: ACPI: button: Sleep Button [SLPF] May 10 00:49:12.616000 audit[1434]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5564ba9c7480 a1=338ac a2=7f017fa2bbc5 a3=5 items=110 ppid=1425 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.616000 audit: CWD cwd="/" May 10 00:49:12.616000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=1 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=2 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=3 name=(null) inode=13945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=4 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=5 name=(null) inode=13946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=6 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=7 name=(null) inode=13947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=8 name=(null) inode=13947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=9 name=(null) inode=13948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=10 name=(null) inode=13947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=11 name=(null) inode=13949 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=12 name=(null) inode=13947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=13 name=(null) inode=13950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=14 name=(null) inode=13947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=15 name=(null) inode=13951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=16 name=(null) inode=13947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=17 name=(null) inode=13952 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=18 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=19 name=(null) inode=13953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=20 name=(null) inode=13953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=21 name=(null) inode=13954 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=22 name=(null) inode=13953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=23 name=(null) inode=13955 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=24 name=(null) inode=13953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=25 name=(null) inode=13956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=26 name=(null) inode=13953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=27 name=(null) inode=13957 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=28 name=(null) inode=13953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=29 name=(null) inode=13958 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=30 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=31 name=(null) inode=13959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=32 name=(null) inode=13959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=33 name=(null) inode=13960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=34 name=(null) inode=13959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=35 name=(null) inode=13961 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=36 name=(null) inode=13959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=37 name=(null) inode=13962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=38 name=(null) inode=13959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=39 name=(null) inode=13963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=40 name=(null) inode=13959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=41 name=(null) inode=13964 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=42 name=(null) inode=13944 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=43 name=(null) inode=13965 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=44 name=(null) inode=13965 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=45 name=(null) inode=13966 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=46 name=(null) inode=13965 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=47 name=(null) inode=13967 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=48 name=(null) inode=13965 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=49 name=(null) inode=13968 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=50 name=(null) inode=13965 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=51 name=(null) inode=13969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=52 name=(null) inode=13965 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=53 name=(null) inode=13970 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=55 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=56 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=57 name=(null) inode=13972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=58 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=59 name=(null) inode=13973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=60 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=61 name=(null) inode=13974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=62 name=(null) inode=13974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=63 name=(null) inode=13975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=64 name=(null) inode=13974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=65 name=(null) inode=13976 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=66 name=(null) inode=13974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=67 name=(null) inode=13977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=68 name=(null) inode=13974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=69 name=(null) inode=13978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=70 name=(null) inode=13974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=71 name=(null) inode=13979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=72 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=73 name=(null) inode=13980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=74 name=(null) inode=13980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=75 name=(null) inode=13981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=76 name=(null) inode=13980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=77 name=(null) inode=13982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=78 name=(null) inode=13980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=79 name=(null) inode=13983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=80 name=(null) inode=13980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=81 name=(null) inode=13984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=82 name=(null) inode=13980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=83 name=(null) inode=13985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=84 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=85 name=(null) inode=13986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=86 name=(null) inode=13986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=87 name=(null) inode=13987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=88 name=(null) inode=13986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=89 name=(null) inode=13988 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=90 name=(null) inode=13986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=91 name=(null) inode=13989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=92 name=(null) inode=13986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=93 name=(null) inode=13990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=94 name=(null) inode=13986 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=95 name=(null) inode=13991 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=96 name=(null) inode=13971 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=97 name=(null) inode=13992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=98 name=(null) inode=13992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=99 name=(null) inode=13993 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=100 name=(null) inode=13992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=101 name=(null) inode=13994 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=102 name=(null) inode=13992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=103 name=(null) inode=13995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=104 name=(null) inode=13992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=105 name=(null) inode=13996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=106 name=(null) inode=13992 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=107 name=(null) inode=13997 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PATH item=109 name=(null) inode=13998 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:12.616000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:49:12.640739 systemd-networkd[1435]: eth0: Link UP May 10 00:49:12.641266 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:49:12.640889 systemd-networkd[1435]: eth0: Gained carrier May 10 00:49:12.649280 systemd-networkd[1435]: eth0: DHCPv4 address 172.31.21.73/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:49:12.665170 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 10 00:49:12.669164 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 10 00:49:12.678314 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:49:12.784890 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:49:12.787608 systemd[1]: Finished systemd-udev-settle.service. May 10 00:49:12.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.791733 systemd[1]: Starting lvm2-activation-early.service... May 10 00:49:12.841439 lvm[1541]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:49:12.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.871439 systemd[1]: Finished lvm2-activation-early.service. May 10 00:49:12.872161 systemd[1]: Reached target cryptsetup.target. May 10 00:49:12.874283 systemd[1]: Starting lvm2-activation.service... May 10 00:49:12.880025 lvm[1543]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:49:12.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:12.900502 systemd[1]: Finished lvm2-activation.service. May 10 00:49:12.901892 systemd[1]: Reached target local-fs-pre.target. May 10 00:49:12.903049 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:49:12.903081 systemd[1]: Reached target local-fs.target. May 10 00:49:12.904166 systemd[1]: Reached target machines.target. May 10 00:49:12.907238 systemd[1]: Starting ldconfig.service... May 10 00:49:12.909332 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:12.909422 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:12.910850 systemd[1]: Starting systemd-boot-update.service... May 10 00:49:12.912573 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:49:12.914492 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:49:12.916251 systemd[1]: Starting systemd-sysext.service... May 10 00:49:12.920077 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1546 (bootctl) May 10 00:49:12.921527 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:49:12.934431 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:49:12.941689 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:49:12.942113 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:49:12.963185 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:49:12.970537 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:49:12.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.071158 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:49:13.088168 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:49:13.093510 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:49:13.094338 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:49:13.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.108755 systemd-fsck[1559]: fsck.fat 4.2 (2021-01-31) May 10 00:49:13.108755 systemd-fsck[1559]: /dev/nvme0n1p1: 790 files, 120688/258078 clusters May 10 00:49:13.109234 (sd-sysext)[1562]: Using extensions 'kubernetes'. May 10 00:49:13.109743 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:49:13.110469 (sd-sysext)[1562]: Merged extensions into '/usr'. May 10 00:49:13.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.114245 systemd[1]: Mounting boot.mount... May 10 00:49:13.149264 systemd[1]: Mounted boot.mount. May 10 00:49:13.157066 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:13.160211 systemd[1]: Mounting usr-share-oem.mount... May 10 00:49:13.161826 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:13.164286 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:13.172364 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:13.176788 systemd[1]: Starting modprobe@loop.service... May 10 00:49:13.177931 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:13.178203 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:13.178795 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:13.191387 systemd[1]: Finished systemd-boot-update.service. May 10 00:49:13.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.192913 systemd[1]: Mounted usr-share-oem.mount. May 10 00:49:13.194878 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:13.196214 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:13.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.198333 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:13.198569 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:13.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.200422 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:13.200876 systemd[1]: Finished modprobe@loop.service. May 10 00:49:13.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.209455 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:13.209523 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:13.209981 systemd[1]: Finished systemd-sysext.service. May 10 00:49:13.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.214720 systemd[1]: Starting ensure-sysext.service... May 10 00:49:13.219307 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:49:13.227893 systemd[1]: Reloading. May 10 00:49:13.244736 systemd-tmpfiles[1593]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:49:13.247223 systemd-tmpfiles[1593]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:49:13.250874 systemd-tmpfiles[1593]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:49:13.311906 /usr/lib/systemd/system-generators/torcx-generator[1612]: time="2025-05-10T00:49:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:13.311946 /usr/lib/systemd/system-generators/torcx-generator[1612]: time="2025-05-10T00:49:13Z" level=info msg="torcx already run" May 10 00:49:13.497765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:13.497786 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:13.517608 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:13.604434 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:49:13.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.611822 systemd[1]: Starting audit-rules.service... May 10 00:49:13.614525 systemd[1]: Starting clean-ca-certificates.service... May 10 00:49:13.620741 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:49:13.626177 systemd[1]: Starting systemd-resolved.service... May 10 00:49:13.630880 systemd[1]: Starting systemd-timesyncd.service... May 10 00:49:13.637740 systemd[1]: Starting systemd-update-utmp.service... May 10 00:49:13.639724 systemd[1]: Finished clean-ca-certificates.service. May 10 00:49:13.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.652646 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:13.654545 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:13.661252 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:13.663910 systemd[1]: Starting modprobe@loop.service... May 10 00:49:13.667280 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:13.667520 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:13.667736 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:13.669116 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:13.669367 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:13.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.677089 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:13.677349 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:13.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.679735 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:13.680383 systemd[1]: Finished modprobe@loop.service. May 10 00:49:13.682000 audit[1683]: SYSTEM_BOOT pid=1683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:49:13.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.683646 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:13.683882 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:13.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.690425 systemd[1]: Finished systemd-update-utmp.service. May 10 00:49:13.695609 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:13.700871 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:13.703812 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:13.706787 systemd[1]: Starting modprobe@loop.service... May 10 00:49:13.708014 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:13.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.710854 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:13.711057 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:13.713408 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:13.713627 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:13.716844 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:13.717062 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:13.718316 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:13.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.729067 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:13.729310 systemd[1]: Finished modprobe@loop.service. May 10 00:49:13.730466 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:13.735382 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:13.737321 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:13.743975 systemd[1]: Starting modprobe@drm.service... May 10 00:49:13.746919 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:13.754351 systemd[1]: Starting modprobe@loop.service... May 10 00:49:13.755242 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:13.755465 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:13.755678 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:13.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.759372 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:13.759634 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:13.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.765851 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:49:13.766090 systemd[1]: Finished modprobe@drm.service. May 10 00:49:13.768421 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:13.768641 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:13.769964 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:13.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.774094 systemd[1]: Finished ensure-sysext.service. May 10 00:49:13.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.777753 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:13.777997 systemd[1]: Finished modprobe@loop.service. May 10 00:49:13.778835 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:13.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.815484 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:49:13.854000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:49:13.854000 audit[1724]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffece741e0 a2=420 a3=0 items=0 ppid=1676 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.854000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:49:13.855824 systemd[1]: Finished audit-rules.service. May 10 00:49:13.857076 augenrules[1724]: No rules May 10 00:49:13.880523 systemd[1]: Started systemd-timesyncd.service. May 10 00:49:13.881363 systemd[1]: Reached target time-set.target. May 10 00:49:13.907270 systemd-networkd[1435]: eth0: Gained IPv6LL May 10 00:49:13.910005 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:49:13.920016 systemd-resolved[1680]: Positive Trust Anchors: May 10 00:49:13.920038 systemd-resolved[1680]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:49:13.920081 systemd-resolved[1680]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:49:13.941625 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:13.941648 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:13.958090 systemd-resolved[1680]: Defaulting to hostname 'linux'. May 10 00:49:13.959996 systemd[1]: Started systemd-resolved.service. May 10 00:49:13.960510 systemd[1]: Reached target network.target. May 10 00:49:13.960866 systemd[1]: Reached target network-online.target. May 10 00:49:13.961207 systemd[1]: Reached target nss-lookup.target. May 10 00:49:13.989984 ldconfig[1545]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:49:13.999579 systemd[1]: Finished ldconfig.service. May 10 00:49:14.001375 systemd[1]: Starting systemd-update-done.service... May 10 00:49:14.009293 systemd[1]: Finished systemd-update-done.service. May 10 00:49:14.009796 systemd[1]: Reached target sysinit.target. May 10 00:49:14.010307 systemd[1]: Started motdgen.path. May 10 00:49:14.010678 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:49:14.011181 systemd[1]: Started logrotate.timer. May 10 00:49:14.011598 systemd[1]: Started mdadm.timer. May 10 00:49:14.011937 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:49:14.012312 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:49:14.012344 systemd[1]: Reached target paths.target. May 10 00:49:14.012678 systemd[1]: Reached target timers.target. May 10 00:49:14.013363 systemd[1]: Listening on dbus.socket. May 10 00:49:14.014822 systemd[1]: Starting docker.socket... May 10 00:49:14.017243 systemd[1]: Listening on sshd.socket. May 10 00:49:14.017817 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:14.018618 systemd[1]: Listening on docker.socket. May 10 00:49:14.019096 systemd[1]: Reached target sockets.target. May 10 00:49:14.019548 systemd[1]: Reached target basic.target. May 10 00:49:14.020035 systemd[1]: System is tainted: cgroupsv1 May 10 00:49:14.020079 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:49:14.020101 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:49:14.021318 systemd[1]: Started amazon-ssm-agent.service. May 10 00:49:14.023009 systemd[1]: Starting containerd.service... May 10 00:49:14.024480 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:49:14.026615 systemd[1]: Starting dbus.service... May 10 00:49:14.029113 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:49:14.031249 systemd[1]: Starting extend-filesystems.service... May 10 00:49:14.032261 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:49:14.033543 systemd[1]: Starting kubelet.service... May 10 00:49:14.035252 systemd[1]: Starting motdgen.service... May 10 00:49:14.037262 systemd[1]: Started nvidia.service. May 10 00:49:14.051977 jq[1742]: false May 10 00:49:15.118466 systemd-resolved[1680]: Clock change detected. Flushing caches. May 10 00:49:15.118571 systemd[1]: Starting prepare-helm.service... May 10 00:49:15.118596 systemd-timesyncd[1681]: Contacted time server 162.159.200.123:123 (0.flatcar.pool.ntp.org). May 10 00:49:15.118648 systemd-timesyncd[1681]: Initial clock synchronization to Sat 2025-05-10 00:49:15.118423 UTC. May 10 00:49:15.121174 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:49:15.131144 systemd[1]: Starting sshd-keygen.service... May 10 00:49:15.134878 systemd[1]: Starting systemd-logind.service... May 10 00:49:15.135450 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:15.135543 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:49:15.143608 systemd[1]: Starting update-engine.service... May 10 00:49:15.145378 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:49:15.147812 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:49:15.148051 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:49:15.237165 jq[1767]: true May 10 00:49:15.260326 tar[1771]: linux-amd64/helm May 10 00:49:15.241114 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:49:15.241349 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:49:15.263456 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:49:15.263708 systemd[1]: Finished motdgen.service. May 10 00:49:15.268807 extend-filesystems[1743]: Found loop1 May 10 00:49:15.270989 extend-filesystems[1743]: Found nvme0n1 May 10 00:49:15.271655 extend-filesystems[1743]: Found nvme0n1p1 May 10 00:49:15.272480 extend-filesystems[1743]: Found nvme0n1p2 May 10 00:49:15.277013 extend-filesystems[1743]: Found nvme0n1p3 May 10 00:49:15.279365 extend-filesystems[1743]: Found usr May 10 00:49:15.279860 extend-filesystems[1743]: Found nvme0n1p4 May 10 00:49:15.300833 jq[1782]: true May 10 00:49:15.311638 extend-filesystems[1743]: Found nvme0n1p6 May 10 00:49:15.311638 extend-filesystems[1743]: Found nvme0n1p7 May 10 00:49:15.311638 extend-filesystems[1743]: Found nvme0n1p9 May 10 00:49:15.311638 extend-filesystems[1743]: Checking size of /dev/nvme0n1p9 May 10 00:49:15.317706 systemd[1]: Started dbus.service. May 10 00:49:15.317505 dbus-daemon[1741]: [system] SELinux support is enabled May 10 00:49:15.320077 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:49:15.320100 systemd[1]: Reached target system-config.target. May 10 00:49:15.320547 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:49:15.320565 systemd[1]: Reached target user-config.target. May 10 00:49:15.338519 dbus-daemon[1741]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1435 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 00:49:15.341926 systemd[1]: Starting systemd-hostnamed.service... May 10 00:49:15.378797 extend-filesystems[1743]: Resized partition /dev/nvme0n1p9 May 10 00:49:15.389313 amazon-ssm-agent[1737]: 2025/05/10 00:49:15 Failed to load instance info from vault. RegistrationKey does not exist. May 10 00:49:15.390366 amazon-ssm-agent[1737]: Initializing new seelog logger May 10 00:49:15.390508 amazon-ssm-agent[1737]: New Seelog Logger Creation Complete May 10 00:49:15.390566 amazon-ssm-agent[1737]: 2025/05/10 00:49:15 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:49:15.390566 amazon-ssm-agent[1737]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:49:15.390721 amazon-ssm-agent[1737]: 2025/05/10 00:49:15 processing appconfig overrides May 10 00:49:15.396530 bash[1811]: Updated "/home/core/.ssh/authorized_keys" May 10 00:49:15.397900 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:49:15.404702 extend-filesystems[1816]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:49:15.439938 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 10 00:49:15.445023 update_engine[1766]: I0510 00:49:15.444372 1766 main.cc:92] Flatcar Update Engine starting May 10 00:49:15.451440 systemd[1]: Started update-engine.service. May 10 00:49:15.455223 systemd[1]: Started locksmithd.service. May 10 00:49:15.457255 update_engine[1766]: I0510 00:49:15.457116 1766 update_check_scheduler.cc:74] Next update check in 2m57s May 10 00:49:15.473643 env[1773]: time="2025-05-10T00:49:15.473582908Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:49:15.562506 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 10 00:49:15.581241 extend-filesystems[1816]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 10 00:49:15.581241 extend-filesystems[1816]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:49:15.581241 extend-filesystems[1816]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 10 00:49:15.587619 extend-filesystems[1743]: Resized filesystem in /dev/nvme0n1p9 May 10 00:49:15.583316 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:49:15.583699 systemd[1]: Finished extend-filesystems.service. May 10 00:49:15.596341 systemd-logind[1758]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:49:15.599592 systemd-logind[1758]: Watching system buttons on /dev/input/event2 (Sleep Button) May 10 00:49:15.601607 systemd-logind[1758]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:49:15.603764 systemd-logind[1758]: New seat seat0. May 10 00:49:15.606536 systemd[1]: Started systemd-logind.service. May 10 00:49:15.616397 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:49:15.724953 env[1773]: time="2025-05-10T00:49:15.724903774Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:49:15.727275 env[1773]: time="2025-05-10T00:49:15.727239374Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:15.729406 env[1773]: time="2025-05-10T00:49:15.729354180Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:49:15.732665 env[1773]: time="2025-05-10T00:49:15.732629500Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:15.733162 env[1773]: time="2025-05-10T00:49:15.733132576Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:49:15.734139 env[1773]: time="2025-05-10T00:49:15.734110986Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:49:15.734475 env[1773]: time="2025-05-10T00:49:15.734449446Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:49:15.735155 env[1773]: time="2025-05-10T00:49:15.735130367Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:49:15.735675 env[1773]: time="2025-05-10T00:49:15.735653198Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:15.738102 env[1773]: time="2025-05-10T00:49:15.737838010Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:15.738532 env[1773]: time="2025-05-10T00:49:15.738504341Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:49:15.739159 env[1773]: time="2025-05-10T00:49:15.739136593Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:49:15.739525 env[1773]: time="2025-05-10T00:49:15.739503731Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:49:15.739685 env[1773]: time="2025-05-10T00:49:15.739667125Z" level=info msg="metadata content store policy set" policy=shared May 10 00:49:15.753002 env[1773]: time="2025-05-10T00:49:15.752959788Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:49:15.753186 env[1773]: time="2025-05-10T00:49:15.753167144Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:49:15.753284 env[1773]: time="2025-05-10T00:49:15.753267967Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:49:15.753422 env[1773]: time="2025-05-10T00:49:15.753404865Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:49:15.753577 env[1773]: time="2025-05-10T00:49:15.753559387Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:49:15.753672 env[1773]: time="2025-05-10T00:49:15.753655684Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:49:15.753751 env[1773]: time="2025-05-10T00:49:15.753735976Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:49:15.753833 env[1773]: time="2025-05-10T00:49:15.753814680Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:49:15.753907 env[1773]: time="2025-05-10T00:49:15.753893187Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:49:15.754016 env[1773]: time="2025-05-10T00:49:15.754001052Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:49:15.754089 env[1773]: time="2025-05-10T00:49:15.754076390Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:49:15.754156 env[1773]: time="2025-05-10T00:49:15.754144055Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:49:15.754360 env[1773]: time="2025-05-10T00:49:15.754347090Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:49:15.754534 env[1773]: time="2025-05-10T00:49:15.754518728Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:49:15.755117 env[1773]: time="2025-05-10T00:49:15.755098224Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:49:15.755233 env[1773]: time="2025-05-10T00:49:15.755217575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755308 env[1773]: time="2025-05-10T00:49:15.755295022Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:49:15.755420 env[1773]: time="2025-05-10T00:49:15.755407621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755483 env[1773]: time="2025-05-10T00:49:15.755471693Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755563 env[1773]: time="2025-05-10T00:49:15.755550188Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755641 env[1773]: time="2025-05-10T00:49:15.755627268Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755709 env[1773]: time="2025-05-10T00:49:15.755696725Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755785 env[1773]: time="2025-05-10T00:49:15.755773049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755851 env[1773]: time="2025-05-10T00:49:15.755838708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:49:15.755946 env[1773]: time="2025-05-10T00:49:15.755905236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:49:15.756024 env[1773]: time="2025-05-10T00:49:15.756011346Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:49:15.756240 env[1773]: time="2025-05-10T00:49:15.756224043Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:49:15.756330 env[1773]: time="2025-05-10T00:49:15.756315576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:49:15.756400 env[1773]: time="2025-05-10T00:49:15.756388107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:49:15.756474 env[1773]: time="2025-05-10T00:49:15.756460283Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:49:15.756570 env[1773]: time="2025-05-10T00:49:15.756552057Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:49:15.756635 env[1773]: time="2025-05-10T00:49:15.756622501Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:49:15.756722 env[1773]: time="2025-05-10T00:49:15.756706780Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:49:15.756817 env[1773]: time="2025-05-10T00:49:15.756803801Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:49:15.757206 env[1773]: time="2025-05-10T00:49:15.757135687Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:49:15.760027 env[1773]: time="2025-05-10T00:49:15.757356365Z" level=info msg="Connect containerd service" May 10 00:49:15.760027 env[1773]: time="2025-05-10T00:49:15.757413787Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:49:15.787383 env[1773]: time="2025-05-10T00:49:15.787335081Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:49:15.787909 env[1773]: time="2025-05-10T00:49:15.787885737Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:49:15.788051 env[1773]: time="2025-05-10T00:49:15.788036679Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:49:15.788177 env[1773]: time="2025-05-10T00:49:15.788163951Z" level=info msg="containerd successfully booted in 0.318528s" May 10 00:49:15.788301 systemd[1]: Started containerd.service. May 10 00:49:15.799115 env[1773]: time="2025-05-10T00:49:15.799051586Z" level=info msg="Start subscribing containerd event" May 10 00:49:15.799891 env[1773]: time="2025-05-10T00:49:15.799863271Z" level=info msg="Start recovering state" May 10 00:49:15.800886 env[1773]: time="2025-05-10T00:49:15.800863384Z" level=info msg="Start event monitor" May 10 00:49:15.801376 env[1773]: time="2025-05-10T00:49:15.801355925Z" level=info msg="Start snapshots syncer" May 10 00:49:15.801473 env[1773]: time="2025-05-10T00:49:15.801459318Z" level=info msg="Start cni network conf syncer for default" May 10 00:49:15.801798 env[1773]: time="2025-05-10T00:49:15.801779235Z" level=info msg="Start streaming server" May 10 00:49:15.873824 dbus-daemon[1741]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 00:49:15.874001 systemd[1]: Started systemd-hostnamed.service. May 10 00:49:15.876055 dbus-daemon[1741]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1802 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 00:49:15.879963 systemd[1]: Starting polkit.service... May 10 00:49:15.907283 polkitd[1884]: Started polkitd version 121 May 10 00:49:15.934231 polkitd[1884]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:49:15.934311 polkitd[1884]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:49:15.936986 polkitd[1884]: Finished loading, compiling and executing 2 rules May 10 00:49:15.937563 dbus-daemon[1741]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:49:15.937757 systemd[1]: Started polkit.service. May 10 00:49:15.939980 polkitd[1884]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:49:15.967856 systemd-hostnamed[1802]: Hostname set to (transient) May 10 00:49:15.967860 systemd-resolved[1680]: System hostname changed to 'ip-172-31-21-73'. May 10 00:49:16.025671 coreos-metadata[1739]: May 10 00:49:16.023 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 10 00:49:16.029793 coreos-metadata[1739]: May 10 00:49:16.029 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 10 00:49:16.030757 coreos-metadata[1739]: May 10 00:49:16.030 INFO Fetch successful May 10 00:49:16.030932 coreos-metadata[1739]: May 10 00:49:16.030 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 00:49:16.033647 coreos-metadata[1739]: May 10 00:49:16.033 INFO Fetch successful May 10 00:49:16.037985 unknown[1739]: wrote ssh authorized keys file for user: core May 10 00:49:16.065149 update-ssh-keys[1923]: Updated "/home/core/.ssh/authorized_keys" May 10 00:49:16.065666 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:49:16.161407 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Create new startup processor May 10 00:49:16.166744 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [LongRunningPluginsManager] registered plugins: {} May 10 00:49:16.167395 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing bookkeeping folders May 10 00:49:16.167511 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO removing the completed state files May 10 00:49:16.167592 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing bookkeeping folders for long running plugins May 10 00:49:16.167653 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 10 00:49:16.167772 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing healthcheck folders for long running plugins May 10 00:49:16.167836 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing locations for inventory plugin May 10 00:49:16.167898 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing default location for custom inventory May 10 00:49:16.168127 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing default location for file inventory May 10 00:49:16.168196 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Initializing default location for role inventory May 10 00:49:16.168271 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Init the cloudwatchlogs publisher May 10 00:49:16.168335 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:updateSsmAgent May 10 00:49:16.168394 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:refreshAssociation May 10 00:49:16.168554 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:softwareInventory May 10 00:49:16.170763 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:runPowerShellScript May 10 00:49:16.170885 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:configureDocker May 10 00:49:16.170955 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:runDockerAction May 10 00:49:16.171012 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:configurePackage May 10 00:49:16.171073 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:downloadContent May 10 00:49:16.171145 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform independent plugin aws:runDocument May 10 00:49:16.171206 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Successfully loaded platform dependent plugin aws:runShellScript May 10 00:49:16.171266 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 10 00:49:16.171330 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO OS: linux, Arch: amd64 May 10 00:49:16.171787 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] Starting document processing engine... May 10 00:49:16.173523 amazon-ssm-agent[1737]: datastore file /var/lib/amazon/ssm/i-0e60cc67cbafa14f8/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 10 00:49:16.270300 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 10 00:49:16.365159 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 10 00:49:16.459688 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] Starting message polling May 10 00:49:16.554744 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] Starting send replies to MDS May 10 00:49:16.649526 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [instanceID=i-0e60cc67cbafa14f8] Starting association polling May 10 00:49:16.745237 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 10 00:49:16.783994 tar[1771]: linux-amd64/LICENSE May 10 00:49:16.783994 tar[1771]: linux-amd64/README.md May 10 00:49:16.799939 systemd[1]: Finished prepare-helm.service. May 10 00:49:16.840506 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [Association] Launching response handler May 10 00:49:16.937813 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 10 00:49:16.981206 locksmithd[1827]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:49:17.033543 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 10 00:49:17.129350 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 10 00:49:17.180324 sshd_keygen[1784]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:49:17.211264 systemd[1]: Finished sshd-keygen.service. May 10 00:49:17.216240 systemd[1]: Starting issuegen.service... May 10 00:49:17.225388 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [HealthCheck] HealthCheck reporting agent health. May 10 00:49:17.226783 systemd[1]: Started kubelet.service. May 10 00:49:17.229880 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:49:17.230230 systemd[1]: Finished issuegen.service. May 10 00:49:17.234661 systemd[1]: Starting systemd-user-sessions.service... May 10 00:49:17.243420 systemd[1]: Finished systemd-user-sessions.service. May 10 00:49:17.246761 systemd[1]: Started getty@tty1.service. May 10 00:49:17.249742 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:49:17.252002 systemd[1]: Reached target getty.target. May 10 00:49:17.253403 systemd[1]: Reached target multi-user.target. May 10 00:49:17.257006 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:49:17.270283 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:49:17.270648 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:49:17.276170 systemd[1]: Startup finished in 8.120s (kernel) + 8.942s (userspace) = 17.062s. May 10 00:49:17.321613 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] Starting session document processing engine... May 10 00:49:17.418062 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] [EngineProcessor] Starting May 10 00:49:17.514890 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 10 00:49:17.611928 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0e60cc67cbafa14f8, requestId: d0f4bdde-57a5-40b8-b1d1-c7ab65350d38 May 10 00:49:17.708917 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [OfflineService] Starting document processing engine... May 10 00:49:17.806164 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [OfflineService] [EngineProcessor] Starting May 10 00:49:17.903689 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [OfflineService] [EngineProcessor] Initial processing May 10 00:49:18.001279 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [OfflineService] Starting message polling May 10 00:49:18.098118 kubelet[1966]: E0510 00:49:18.098069 1966 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:49:18.099105 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [OfflineService] Starting send replies to MDS May 10 00:49:18.100431 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:49:18.100613 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:49:18.197242 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [LongRunningPluginsManager] starting long running plugin manager May 10 00:49:18.295405 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 10 00:49:18.393854 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] listening reply. May 10 00:49:18.492589 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 10 00:49:18.591395 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [StartupProcessor] Executing startup processor tasks May 10 00:49:18.690440 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 10 00:49:18.789756 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 10 00:49:18.889104 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 10 00:49:18.988740 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0e60cc67cbafa14f8?role=subscribe&stream=input May 10 00:49:19.088663 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0e60cc67cbafa14f8?role=subscribe&stream=input May 10 00:49:19.188653 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] Starting receiving message from control channel May 10 00:49:19.288843 amazon-ssm-agent[1737]: 2025-05-10 00:49:16 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 10 00:49:25.001178 systemd[1]: Created slice system-sshd.slice. May 10 00:49:25.002479 systemd[1]: Started sshd@0-172.31.21.73:22-139.178.89.65:57258.service. May 10 00:49:25.192632 sshd[1983]: Accepted publickey for core from 139.178.89.65 port 57258 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:25.195606 sshd[1983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:25.209106 systemd[1]: Created slice user-500.slice. May 10 00:49:25.210127 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:49:25.213602 systemd-logind[1758]: New session 1 of user core. May 10 00:49:25.221133 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:49:25.222474 systemd[1]: Starting user@500.service... May 10 00:49:25.228026 (systemd)[1986]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:25.330771 systemd[1986]: Queued start job for default target default.target. May 10 00:49:25.331183 systemd[1986]: Reached target paths.target. May 10 00:49:25.331209 systemd[1986]: Reached target sockets.target. May 10 00:49:25.331229 systemd[1986]: Reached target timers.target. May 10 00:49:25.331249 systemd[1986]: Reached target basic.target. May 10 00:49:25.331414 systemd[1]: Started user@500.service. May 10 00:49:25.332821 systemd[1]: Started session-1.scope. May 10 00:49:25.333258 systemd[1986]: Reached target default.target. May 10 00:49:25.333726 systemd[1986]: Startup finished in 98ms. May 10 00:49:25.470989 systemd[1]: Started sshd@1-172.31.21.73:22-139.178.89.65:57272.service. May 10 00:49:25.632799 sshd[1997]: Accepted publickey for core from 139.178.89.65 port 57272 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:25.633941 sshd[1997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:25.638543 systemd-logind[1758]: New session 2 of user core. May 10 00:49:25.639042 systemd[1]: Started session-2.scope. May 10 00:49:25.770240 sshd[1997]: pam_unix(sshd:session): session closed for user core May 10 00:49:25.772954 systemd[1]: sshd@1-172.31.21.73:22-139.178.89.65:57272.service: Deactivated successfully. May 10 00:49:25.774114 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:49:25.774504 systemd-logind[1758]: Session 2 logged out. Waiting for processes to exit. May 10 00:49:25.775369 systemd-logind[1758]: Removed session 2. May 10 00:49:25.793890 systemd[1]: Started sshd@2-172.31.21.73:22-139.178.89.65:57286.service. May 10 00:49:25.954202 sshd[2004]: Accepted publickey for core from 139.178.89.65 port 57286 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:25.956022 sshd[2004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:25.961483 systemd[1]: Started session-3.scope. May 10 00:49:25.962466 systemd-logind[1758]: New session 3 of user core. May 10 00:49:26.085814 sshd[2004]: pam_unix(sshd:session): session closed for user core May 10 00:49:26.088607 systemd[1]: sshd@2-172.31.21.73:22-139.178.89.65:57286.service: Deactivated successfully. May 10 00:49:26.090120 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:49:26.090779 systemd-logind[1758]: Session 3 logged out. Waiting for processes to exit. May 10 00:49:26.091876 systemd-logind[1758]: Removed session 3. May 10 00:49:26.109251 systemd[1]: Started sshd@3-172.31.21.73:22-139.178.89.65:57292.service. May 10 00:49:26.267923 sshd[2011]: Accepted publickey for core from 139.178.89.65 port 57292 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:26.269720 sshd[2011]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:26.274931 systemd[1]: Started session-4.scope. May 10 00:49:26.275133 systemd-logind[1758]: New session 4 of user core. May 10 00:49:26.402465 sshd[2011]: pam_unix(sshd:session): session closed for user core May 10 00:49:26.404924 systemd[1]: sshd@3-172.31.21.73:22-139.178.89.65:57292.service: Deactivated successfully. May 10 00:49:26.405770 systemd-logind[1758]: Session 4 logged out. Waiting for processes to exit. May 10 00:49:26.405832 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:49:26.406681 systemd-logind[1758]: Removed session 4. May 10 00:49:26.426685 systemd[1]: Started sshd@4-172.31.21.73:22-139.178.89.65:57308.service. May 10 00:49:26.586365 sshd[2018]: Accepted publickey for core from 139.178.89.65 port 57308 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:26.587288 sshd[2018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:26.592343 systemd[1]: Started session-5.scope. May 10 00:49:26.592719 systemd-logind[1758]: New session 5 of user core. May 10 00:49:26.736865 sudo[2022]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:49:26.737130 sudo[2022]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:26.744712 dbus-daemon[1741]: \xd0m\xf4\xc3oU: received setenforce notice (enforcing=-1688102896) May 10 00:49:26.746481 sudo[2022]: pam_unix(sudo:session): session closed for user root May 10 00:49:26.770917 sshd[2018]: pam_unix(sshd:session): session closed for user core May 10 00:49:26.774667 systemd[1]: sshd@4-172.31.21.73:22-139.178.89.65:57308.service: Deactivated successfully. May 10 00:49:26.775810 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:49:26.777475 systemd-logind[1758]: Session 5 logged out. Waiting for processes to exit. May 10 00:49:26.778711 systemd-logind[1758]: Removed session 5. May 10 00:49:26.795137 systemd[1]: Started sshd@5-172.31.21.73:22-139.178.89.65:48972.service. May 10 00:49:26.956842 sshd[2026]: Accepted publickey for core from 139.178.89.65 port 48972 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:26.957765 sshd[2026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:26.963310 systemd[1]: Started session-6.scope. May 10 00:49:26.963603 systemd-logind[1758]: New session 6 of user core. May 10 00:49:27.067634 sudo[2031]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:49:27.067870 sudo[2031]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:27.071086 sudo[2031]: pam_unix(sudo:session): session closed for user root May 10 00:49:27.076346 sudo[2030]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:49:27.076606 sudo[2030]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:27.086703 systemd[1]: Stopping audit-rules.service... May 10 00:49:27.087000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:49:27.089143 kernel: kauditd_printk_skb: 180 callbacks suppressed May 10 00:49:27.089230 kernel: audit: type=1305 audit(1746838167.087:159): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:49:27.089253 auditctl[2034]: No rules May 10 00:49:27.087000 audit[2034]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa3169470 a2=420 a3=0 items=0 ppid=1 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.089727 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:49:27.089970 systemd[1]: Stopped audit-rules.service. May 10 00:49:27.091915 systemd[1]: Starting audit-rules.service... May 10 00:49:27.095671 kernel: audit: type=1300 audit(1746838167.087:159): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa3169470 a2=420 a3=0 items=0 ppid=1 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.097192 kernel: audit: type=1327 audit(1746838167.087:159): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:49:27.087000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:49:27.100782 kernel: audit: type=1131 audit(1746838167.088:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.116247 augenrules[2052]: No rules May 10 00:49:27.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.117151 systemd[1]: Finished audit-rules.service. May 10 00:49:27.121707 kernel: audit: type=1130 audit(1746838167.116:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.121559 sudo[2030]: pam_unix(sudo:session): session closed for user root May 10 00:49:27.121000 audit[2030]: USER_END pid=2030 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.126530 kernel: audit: type=1106 audit(1746838167.121:162): pid=2030 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.126635 kernel: audit: type=1104 audit(1746838167.121:163): pid=2030 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.121000 audit[2030]: CRED_DISP pid=2030 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.147853 sshd[2026]: pam_unix(sshd:session): session closed for user core May 10 00:49:27.149000 audit[2026]: USER_END pid=2026 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.152529 systemd-logind[1758]: Session 6 logged out. Waiting for processes to exit. May 10 00:49:27.154338 systemd[1]: sshd@5-172.31.21.73:22-139.178.89.65:48972.service: Deactivated successfully. May 10 00:49:27.159093 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:49:27.167428 kernel: audit: type=1106 audit(1746838167.149:164): pid=2026 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.167556 kernel: audit: type=1104 audit(1746838167.149:165): pid=2026 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.149000 audit[2026]: CRED_DISP pid=2026 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.160732 systemd-logind[1758]: Removed session 6. May 10 00:49:27.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.73:22-139.178.89.65:48972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.176585 kernel: audit: type=1131 audit(1746838167.157:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.21.73:22-139.178.89.65:48972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.180025 systemd[1]: Started sshd@6-172.31.21.73:22-139.178.89.65:48974.service. May 10 00:49:27.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.73:22-139.178.89.65:48974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.340000 audit[2059]: USER_ACCT pid=2059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.341000 audit[2059]: CRED_ACQ pid=2059 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.341000 audit[2059]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87b59900 a2=3 a3=0 items=0 ppid=1 pid=2059 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.341000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:49:27.342619 sshd[2059]: Accepted publickey for core from 139.178.89.65 port 48974 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:27.342683 sshd[2059]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:27.347708 systemd[1]: Started session-7.scope. May 10 00:49:27.348023 systemd-logind[1758]: New session 7 of user core. May 10 00:49:27.352000 audit[2059]: USER_START pid=2059 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.353000 audit[2062]: CRED_ACQ pid=2062 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:27.453000 audit[2063]: USER_ACCT pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.453616 sudo[2063]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:49:27.453000 audit[2063]: CRED_REFR pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.453868 sudo[2063]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:27.455000 audit[2063]: USER_START pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:27.477930 systemd[1]: Starting docker.service... May 10 00:49:27.518444 env[2074]: time="2025-05-10T00:49:27.518389090Z" level=info msg="Starting up" May 10 00:49:27.519874 env[2074]: time="2025-05-10T00:49:27.519847524Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:49:27.519874 env[2074]: time="2025-05-10T00:49:27.519870789Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:49:27.520036 env[2074]: time="2025-05-10T00:49:27.519895634Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:49:27.520036 env[2074]: time="2025-05-10T00:49:27.519909362Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:49:27.521923 env[2074]: time="2025-05-10T00:49:27.521887206Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:49:27.521923 env[2074]: time="2025-05-10T00:49:27.521908137Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:49:27.522062 env[2074]: time="2025-05-10T00:49:27.521929441Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:49:27.522062 env[2074]: time="2025-05-10T00:49:27.521942306Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:49:27.530333 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1361175117-merged.mount: Deactivated successfully. May 10 00:49:27.766647 env[2074]: time="2025-05-10T00:49:27.766529103Z" level=warning msg="Your kernel does not support cgroup blkio weight" May 10 00:49:27.766647 env[2074]: time="2025-05-10T00:49:27.766556584Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" May 10 00:49:27.766851 env[2074]: time="2025-05-10T00:49:27.766790266Z" level=info msg="Loading containers: start." May 10 00:49:27.868000 audit[2104]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.868000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffee66f7b60 a2=0 a3=7ffee66f7b4c items=0 ppid=2074 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:49:27.870000 audit[2106]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.870000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd718a4780 a2=0 a3=7ffd718a476c items=0 ppid=2074 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:49:27.872000 audit[2108]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.872000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc9f0945f0 a2=0 a3=7ffc9f0945dc items=0 ppid=2074 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.872000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:49:27.874000 audit[2110]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.874000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd44316110 a2=0 a3=7ffd443160fc items=0 ppid=2074 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.874000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:49:27.877000 audit[2112]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.877000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffcf6f75f0 a2=0 a3=7fffcf6f75dc items=0 ppid=2074 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.877000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:49:27.895000 audit[2117]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.895000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8c7792b0 a2=0 a3=7ffc8c77929c items=0 ppid=2074 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.895000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:49:27.904000 audit[2119]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2119 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.904000 audit[2119]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd600cb2e0 a2=0 a3=7ffd600cb2cc items=0 ppid=2074 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:49:27.906000 audit[2121]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.906000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff23273b20 a2=0 a3=7fff23273b0c items=0 ppid=2074 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:49:27.908000 audit[2123]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.908000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc44cc0390 a2=0 a3=7ffc44cc037c items=0 ppid=2074 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:27.918000 audit[2127]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2127 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.918000 audit[2127]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffda9228cb0 a2=0 a3=7ffda9228c9c items=0 ppid=2074 pid=2127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.918000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:27.923000 audit[2128]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:27.923000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdb3ac7de0 a2=0 a3=7ffdb3ac7dcc items=0 ppid=2074 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:27.923000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:27.956509 kernel: Initializing XFRM netlink socket May 10 00:49:28.007466 env[2074]: time="2025-05-10T00:49:28.007424768Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:49:28.008446 (udev-worker)[2084]: Network interface NamePolicy= disabled on kernel command line. May 10 00:49:28.049000 audit[2136]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.049000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc51e0b5b0 a2=0 a3=7ffc51e0b59c items=0 ppid=2074 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:49:28.060000 audit[2139]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.060000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe93e10330 a2=0 a3=7ffe93e1031c items=0 ppid=2074 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:49:28.063000 audit[2142]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.063000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffc1a6c650 a2=0 a3=7fffc1a6c63c items=0 ppid=2074 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:49:28.065000 audit[2144]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.065000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffffe66b140 a2=0 a3=7ffffe66b12c items=0 ppid=2074 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.065000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:49:28.068000 audit[2146]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.068000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe33669a90 a2=0 a3=7ffe33669a7c items=0 ppid=2074 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.068000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:49:28.070000 audit[2148]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.070000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffce6f0fda0 a2=0 a3=7ffce6f0fd8c items=0 ppid=2074 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.070000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:49:28.072000 audit[2150]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.072000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff7ef4b810 a2=0 a3=7fff7ef4b7fc items=0 ppid=2074 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.072000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:49:28.081000 audit[2153]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.081000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc6d100b00 a2=0 a3=7ffc6d100aec items=0 ppid=2074 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.081000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:49:28.084000 audit[2155]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.084000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe65c42820 a2=0 a3=7ffe65c4280c items=0 ppid=2074 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:49:28.086000 audit[2157]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.086000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc02506cc0 a2=0 a3=7ffc02506cac items=0 ppid=2074 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:49:28.088000 audit[2159]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.088000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3c252400 a2=0 a3=7ffe3c2523ec items=0 ppid=2074 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:49:28.089932 systemd-networkd[1435]: docker0: Link UP May 10 00:49:28.099000 audit[2163]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.099000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdb814940 a2=0 a3=7ffcdb81492c items=0 ppid=2074 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:28.105000 audit[2164]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:28.105000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe7a46f800 a2=0 a3=7ffe7a46f7ec items=0 ppid=2074 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:28.105998 env[2074]: time="2025-05-10T00:49:28.105967649Z" level=info msg="Loading containers: done." May 10 00:49:28.118227 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:49:28.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:28.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:28.118358 systemd[1]: Stopped kubelet.service. May 10 00:49:28.119868 systemd[1]: Starting kubelet.service... May 10 00:49:28.121672 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck234862728-merged.mount: Deactivated successfully. May 10 00:49:28.138358 env[2074]: time="2025-05-10T00:49:28.138306097Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:49:28.138908 env[2074]: time="2025-05-10T00:49:28.138875196Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:49:28.139220 env[2074]: time="2025-05-10T00:49:28.139197825Z" level=info msg="Daemon has completed initialization" May 10 00:49:28.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:28.180850 systemd[1]: Started docker.service. May 10 00:49:28.190407 env[2074]: time="2025-05-10T00:49:28.190356760Z" level=info msg="API listen on /run/docker.sock" May 10 00:49:28.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:28.313402 systemd[1]: Started kubelet.service. May 10 00:49:28.400046 kubelet[2200]: E0510 00:49:28.399903 2200 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:49:28.403426 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:49:28.403605 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:49:28.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:28.687051 amazon-ssm-agent[1737]: 2025-05-10 00:49:28 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 10 00:49:29.800379 env[1773]: time="2025-05-10T00:49:29.800335581Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 00:49:30.355160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1453498479.mount: Deactivated successfully. May 10 00:49:32.112030 env[1773]: time="2025-05-10T00:49:32.111973638Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:32.113981 env[1773]: time="2025-05-10T00:49:32.113950778Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:32.115747 env[1773]: time="2025-05-10T00:49:32.115718136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:32.117215 env[1773]: time="2025-05-10T00:49:32.117185927Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:32.118031 env[1773]: time="2025-05-10T00:49:32.117997646Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 00:49:32.127420 env[1773]: time="2025-05-10T00:49:32.127389026Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 00:49:33.993419 env[1773]: time="2025-05-10T00:49:33.993371998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:33.997173 env[1773]: time="2025-05-10T00:49:33.997123549Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:33.998577 env[1773]: time="2025-05-10T00:49:33.998541432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:34.001300 env[1773]: time="2025-05-10T00:49:34.001261133Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:34.002237 env[1773]: time="2025-05-10T00:49:34.002193977Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 00:49:34.014105 env[1773]: time="2025-05-10T00:49:34.014066617Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 00:49:35.519882 env[1773]: time="2025-05-10T00:49:35.519831833Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:35.522147 env[1773]: time="2025-05-10T00:49:35.522113235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:35.524047 env[1773]: time="2025-05-10T00:49:35.524020703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:35.525382 env[1773]: time="2025-05-10T00:49:35.525357694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:35.526063 env[1773]: time="2025-05-10T00:49:35.526035819Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 00:49:35.536653 env[1773]: time="2025-05-10T00:49:35.536613825Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:49:36.605944 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount252641227.mount: Deactivated successfully. May 10 00:49:37.238362 env[1773]: time="2025-05-10T00:49:37.238284284Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.243663 env[1773]: time="2025-05-10T00:49:37.243413930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.247391 env[1773]: time="2025-05-10T00:49:37.247350660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.253053 env[1773]: time="2025-05-10T00:49:37.253004410Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.253246 env[1773]: time="2025-05-10T00:49:37.253219485Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:49:37.265658 env[1773]: time="2025-05-10T00:49:37.265605674Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:49:37.776829 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2583406440.mount: Deactivated successfully. May 10 00:49:38.654756 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:49:38.655007 systemd[1]: Stopped kubelet.service. May 10 00:49:38.657110 systemd[1]: Starting kubelet.service... May 10 00:49:38.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:38.658215 kernel: kauditd_printk_skb: 88 callbacks suppressed May 10 00:49:38.658283 kernel: audit: type=1130 audit(1746838178.654:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:38.665933 kernel: audit: type=1131 audit(1746838178.654:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:38.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:38.697523 env[1773]: time="2025-05-10T00:49:38.697468470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:38.699841 env[1773]: time="2025-05-10T00:49:38.699801272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:38.706606 env[1773]: time="2025-05-10T00:49:38.706542489Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:38.714646 env[1773]: time="2025-05-10T00:49:38.714609211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:38.715121 env[1773]: time="2025-05-10T00:49:38.715098347Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:49:38.726666 env[1773]: time="2025-05-10T00:49:38.726634845Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 00:49:38.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:38.825578 systemd[1]: Started kubelet.service. May 10 00:49:38.829530 kernel: audit: type=1130 audit(1746838178.825:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:38.886752 kubelet[2253]: E0510 00:49:38.886720 2253 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:49:38.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:38.888855 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:49:38.889012 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:49:38.893535 kernel: audit: type=1131 audit(1746838178.888:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:39.236744 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2315447454.mount: Deactivated successfully. May 10 00:49:39.248039 env[1773]: time="2025-05-10T00:49:39.247975012Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:39.252507 env[1773]: time="2025-05-10T00:49:39.252442260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:39.255381 env[1773]: time="2025-05-10T00:49:39.255341775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:39.258019 env[1773]: time="2025-05-10T00:49:39.257981546Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:39.258587 env[1773]: time="2025-05-10T00:49:39.258546155Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 00:49:39.270876 env[1773]: time="2025-05-10T00:49:39.270838075Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 00:49:39.814383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount179591483.mount: Deactivated successfully. May 10 00:49:42.942446 env[1773]: time="2025-05-10T00:49:42.942392425Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:42.944552 env[1773]: time="2025-05-10T00:49:42.944498682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:42.946987 env[1773]: time="2025-05-10T00:49:42.946940290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:42.950108 env[1773]: time="2025-05-10T00:49:42.950066887Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:42.951032 env[1773]: time="2025-05-10T00:49:42.950988047Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 00:49:45.290107 systemd[1]: Stopped kubelet.service. May 10 00:49:45.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:45.296843 kernel: audit: type=1130 audit(1746838185.289:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:45.296969 kernel: audit: type=1131 audit(1746838185.292:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:45.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:45.297538 systemd[1]: Starting kubelet.service... May 10 00:49:45.327973 systemd[1]: Reloading. May 10 00:49:45.439177 /usr/lib/systemd/system-generators/torcx-generator[2350]: time="2025-05-10T00:49:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:45.439220 /usr/lib/systemd/system-generators/torcx-generator[2350]: time="2025-05-10T00:49:45Z" level=info msg="torcx already run" May 10 00:49:45.581790 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:45.582041 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:45.608099 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:45.734444 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 00:49:45.734588 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 00:49:45.734955 systemd[1]: Stopped kubelet.service. May 10 00:49:45.739067 kernel: audit: type=1130 audit(1746838185.734:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:45.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:45.737242 systemd[1]: Starting kubelet.service... May 10 00:49:46.000322 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 00:49:46.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:46.005840 kernel: audit: type=1131 audit(1746838186.000:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:46.239736 kernel: audit: type=1130 audit(1746838186.233:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:46.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:46.233393 systemd[1]: Started kubelet.service. May 10 00:49:46.287199 kubelet[2423]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:46.287199 kubelet[2423]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:49:46.287199 kubelet[2423]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:46.287199 kubelet[2423]: I0510 00:49:46.286814 2423 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:49:46.634958 kubelet[2423]: I0510 00:49:46.634919 2423 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:49:46.634958 kubelet[2423]: I0510 00:49:46.634949 2423 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:49:46.635237 kubelet[2423]: I0510 00:49:46.635216 2423 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:49:46.656452 kubelet[2423]: E0510 00:49:46.656423 2423 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.73:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.656690 kubelet[2423]: I0510 00:49:46.656676 2423 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:49:46.672460 kubelet[2423]: I0510 00:49:46.672430 2423 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:49:46.675725 kubelet[2423]: I0510 00:49:46.675667 2423 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:49:46.675923 kubelet[2423]: I0510 00:49:46.675722 2423 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-21-73","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:49:46.676030 kubelet[2423]: I0510 00:49:46.675937 2423 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:49:46.676030 kubelet[2423]: I0510 00:49:46.675951 2423 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:49:46.676192 kubelet[2423]: I0510 00:49:46.676137 2423 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:46.677343 kubelet[2423]: I0510 00:49:46.677323 2423 kubelet.go:400] "Attempting to sync node with API server" May 10 00:49:46.677343 kubelet[2423]: I0510 00:49:46.677344 2423 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:49:46.677470 kubelet[2423]: I0510 00:49:46.677365 2423 kubelet.go:312] "Adding apiserver pod source" May 10 00:49:46.677470 kubelet[2423]: I0510 00:49:46.677380 2423 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:49:46.692716 kubelet[2423]: W0510 00:49:46.692633 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.21.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-73&limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.692716 kubelet[2423]: E0510 00:49:46.692699 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-73&limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.697313 kubelet[2423]: W0510 00:49:46.697263 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.21.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.697525 kubelet[2423]: E0510 00:49:46.697468 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.697635 kubelet[2423]: I0510 00:49:46.697589 2423 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:49:46.702968 kubelet[2423]: I0510 00:49:46.702930 2423 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:49:46.703114 kubelet[2423]: W0510 00:49:46.703013 2423 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:49:46.704265 kubelet[2423]: I0510 00:49:46.703587 2423 server.go:1264] "Started kubelet" May 10 00:49:46.717000 audit[2423]: AVC avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.726982 kubelet[2423]: I0510 00:49:46.718073 2423 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:49:46.726982 kubelet[2423]: I0510 00:49:46.718129 2423 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:49:46.726982 kubelet[2423]: I0510 00:49:46.718219 2423 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:49:46.726982 kubelet[2423]: I0510 00:49:46.725516 2423 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:49:46.726982 kubelet[2423]: I0510 00:49:46.726711 2423 server.go:455] "Adding debug handlers to kubelet server" May 10 00:49:46.727511 kernel: audit: type=1400 audit(1746838186.717:214): avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.728178 kubelet[2423]: I0510 00:49:46.727953 2423 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:49:46.728291 kubelet[2423]: I0510 00:49:46.728277 2423 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:49:46.717000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:46.733787 kubelet[2423]: I0510 00:49:46.731425 2423 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:49:46.733968 kubelet[2423]: E0510 00:49:46.728445 2423 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.21.73:6443/api/v1/namespaces/default/events\": dial tcp 172.31.21.73:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-21-73.183e04135e8da8d0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-21-73,UID:ip-172-31-21-73,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-21-73,},FirstTimestamp:2025-05-10 00:49:46.70356296 +0000 UTC m=+0.459769732,LastTimestamp:2025-05-10 00:49:46.70356296 +0000 UTC m=+0.459769732,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-21-73,}" May 10 00:49:46.734534 kernel: audit: type=1401 audit(1746838186.717:214): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:46.717000 audit[2423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000839470 a1=c0007fabb8 a2=c000839440 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.740753 kubelet[2423]: I0510 00:49:46.736220 2423 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:49:46.740753 kubelet[2423]: I0510 00:49:46.736286 2423 reconciler.go:26] "Reconciler: start to sync state" May 10 00:49:46.717000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:46.753878 kubelet[2423]: E0510 00:49:46.747321 2423 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-73?timeout=10s\": dial tcp 172.31.21.73:6443: connect: connection refused" interval="200ms" May 10 00:49:46.753878 kubelet[2423]: I0510 00:49:46.748724 2423 factory.go:221] Registration of the systemd container factory successfully May 10 00:49:46.753878 kubelet[2423]: I0510 00:49:46.748855 2423 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:49:46.753878 kubelet[2423]: I0510 00:49:46.750743 2423 factory.go:221] Registration of the containerd container factory successfully May 10 00:49:46.753878 kubelet[2423]: W0510 00:49:46.752283 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.21.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.753878 kubelet[2423]: E0510 00:49:46.752336 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.756022 kernel: audit: type=1300 audit(1746838186.717:214): arch=c000003e syscall=188 success=no exit=-22 a0=c000839470 a1=c0007fabb8 a2=c000839440 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.756134 kernel: audit: type=1327 audit(1746838186.717:214): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:46.717000 audit[2423]: AVC avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.717000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:46.717000 audit[2423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000719240 a1=c0007fabd0 a2=c000839500 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.717000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:46.717000 audit[2434]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.717000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffea4ea790 a2=0 a3=7fffea4ea77c items=0 ppid=2423 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.772534 kernel: audit: type=1400 audit(1746838186.717:215): avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:49:46.723000 audit[2435]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.723000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8091e4c0 a2=0 a3=7ffe8091e4ac items=0 ppid=2423 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:49:46.728000 audit[2437]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.728000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd36a40080 a2=0 a3=7ffd36a4006c items=0 ppid=2423 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:49:46.734000 audit[2439]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.734000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe1b53bc0 a2=0 a3=7fffe1b53bac items=0 ppid=2423 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:49:46.779517 kubelet[2423]: E0510 00:49:46.779059 2423 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:49:46.781000 audit[2446]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.781000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd7a1759b0 a2=0 a3=7ffd7a17599c items=0 ppid=2423 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:49:46.785178 kubelet[2423]: I0510 00:49:46.785128 2423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:49:46.786000 audit[2447]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:46.786000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8c1b17b0 a2=0 a3=7fff8c1b179c items=0 ppid=2423 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:49:46.793000 audit[2448]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.793000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb7dc5ab0 a2=0 a3=7ffcb7dc5a9c items=0 ppid=2423 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.793000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:49:46.795800 kubelet[2423]: I0510 00:49:46.795755 2423 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:49:46.795973 kubelet[2423]: I0510 00:49:46.795962 2423 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:49:46.796177 kubelet[2423]: I0510 00:49:46.796164 2423 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:49:46.796361 kubelet[2423]: E0510 00:49:46.796313 2423 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:49:46.797638 kubelet[2423]: W0510 00:49:46.797590 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.21.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.797000 audit[2449]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.797000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5e4a5070 a2=0 a3=7ffc5e4a505c items=0 ppid=2423 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:49:46.799000 audit[2450]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2450 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:46.799000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedb799810 a2=0 a3=7ffedb7997fc items=0 ppid=2423 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:49:46.800479 kubelet[2423]: E0510 00:49:46.800454 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:46.803000 audit[2453]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:46.803000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4fd61ed0 a2=0 a3=7fff4fd61ebc items=0 ppid=2423 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:49:46.806000 audit[2452]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:46.806000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd3be1dcb0 a2=0 a3=7ffd3be1dc9c items=0 ppid=2423 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:49:46.807720 kubelet[2423]: I0510 00:49:46.807691 2423 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:49:46.807720 kubelet[2423]: I0510 00:49:46.807708 2423 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:49:46.807855 kubelet[2423]: I0510 00:49:46.807727 2423 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:46.808000 audit[2454]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:46.808000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff7fa3eee0 a2=0 a3=7fff7fa3eecc items=0 ppid=2423 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:49:46.813936 kubelet[2423]: I0510 00:49:46.813903 2423 policy_none.go:49] "None policy: Start" May 10 00:49:46.814584 kubelet[2423]: I0510 00:49:46.814552 2423 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:49:46.814584 kubelet[2423]: I0510 00:49:46.814573 2423 state_mem.go:35] "Initializing new in-memory state store" May 10 00:49:46.827113 kubelet[2423]: I0510 00:49:46.827070 2423 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:49:46.826000 audit[2423]: AVC avc: denied { mac_admin } for pid=2423 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.826000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:46.826000 audit[2423]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000df7d40 a1=c000ecc018 a2=c000df7d10 a3=25 items=0 ppid=1 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.826000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:46.827463 kubelet[2423]: I0510 00:49:46.827238 2423 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:49:46.827463 kubelet[2423]: I0510 00:49:46.827361 2423 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:49:46.828171 kubelet[2423]: I0510 00:49:46.827969 2423 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:49:46.828716 kubelet[2423]: E0510 00:49:46.828663 2423 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-21-73\" not found" May 10 00:49:46.833179 kubelet[2423]: I0510 00:49:46.833139 2423 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-21-73" May 10 00:49:46.833427 kubelet[2423]: E0510 00:49:46.833400 2423 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.21.73:6443/api/v1/nodes\": dial tcp 172.31.21.73:6443: connect: connection refused" node="ip-172-31-21-73" May 10 00:49:46.897279 kubelet[2423]: I0510 00:49:46.897131 2423 topology_manager.go:215] "Topology Admit Handler" podUID="e1879c12a840f1068d616af74218b943" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-21-73" May 10 00:49:46.899968 kubelet[2423]: I0510 00:49:46.899942 2423 topology_manager.go:215] "Topology Admit Handler" podUID="ab5dec989cdcbac92afa69a96708b5b6" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-21-73" May 10 00:49:46.901647 kubelet[2423]: I0510 00:49:46.901624 2423 topology_manager.go:215] "Topology Admit Handler" podUID="60cc5bc082f77e22ef7b6f024c53c30c" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-21-73" May 10 00:49:46.936810 kubelet[2423]: I0510 00:49:46.936772 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ab5dec989cdcbac92afa69a96708b5b6-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-73\" (UID: \"ab5dec989cdcbac92afa69a96708b5b6\") " pod="kube-system/kube-scheduler-ip-172-31-21-73" May 10 00:49:46.936810 kubelet[2423]: I0510 00:49:46.936812 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/60cc5bc082f77e22ef7b6f024c53c30c-ca-certs\") pod \"kube-apiserver-ip-172-31-21-73\" (UID: \"60cc5bc082f77e22ef7b6f024c53c30c\") " pod="kube-system/kube-apiserver-ip-172-31-21-73" May 10 00:49:46.937041 kubelet[2423]: I0510 00:49:46.936840 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/60cc5bc082f77e22ef7b6f024c53c30c-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-73\" (UID: \"60cc5bc082f77e22ef7b6f024c53c30c\") " pod="kube-system/kube-apiserver-ip-172-31-21-73" May 10 00:49:46.937041 kubelet[2423]: I0510 00:49:46.936862 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:46.937041 kubelet[2423]: I0510 00:49:46.936883 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:46.937041 kubelet[2423]: I0510 00:49:46.936913 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:46.937041 kubelet[2423]: I0510 00:49:46.936946 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:46.937212 kubelet[2423]: I0510 00:49:46.936975 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/60cc5bc082f77e22ef7b6f024c53c30c-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-73\" (UID: \"60cc5bc082f77e22ef7b6f024c53c30c\") " pod="kube-system/kube-apiserver-ip-172-31-21-73" May 10 00:49:46.937212 kubelet[2423]: I0510 00:49:46.936996 2423 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:46.948211 kubelet[2423]: E0510 00:49:46.948124 2423 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-73?timeout=10s\": dial tcp 172.31.21.73:6443: connect: connection refused" interval="400ms" May 10 00:49:47.035679 kubelet[2423]: I0510 00:49:47.035653 2423 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-21-73" May 10 00:49:47.036290 kubelet[2423]: E0510 00:49:47.036258 2423 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.21.73:6443/api/v1/nodes\": dial tcp 172.31.21.73:6443: connect: connection refused" node="ip-172-31-21-73" May 10 00:49:47.205391 env[1773]: time="2025-05-10T00:49:47.205103206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-73,Uid:e1879c12a840f1068d616af74218b943,Namespace:kube-system,Attempt:0,}" May 10 00:49:47.207505 env[1773]: time="2025-05-10T00:49:47.207446912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-73,Uid:ab5dec989cdcbac92afa69a96708b5b6,Namespace:kube-system,Attempt:0,}" May 10 00:49:47.211286 env[1773]: time="2025-05-10T00:49:47.211249652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-73,Uid:60cc5bc082f77e22ef7b6f024c53c30c,Namespace:kube-system,Attempt:0,}" May 10 00:49:47.348741 kubelet[2423]: E0510 00:49:47.348691 2423 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-73?timeout=10s\": dial tcp 172.31.21.73:6443: connect: connection refused" interval="800ms" May 10 00:49:47.438299 kubelet[2423]: I0510 00:49:47.438269 2423 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-21-73" May 10 00:49:47.438740 kubelet[2423]: E0510 00:49:47.438697 2423 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.21.73:6443/api/v1/nodes\": dial tcp 172.31.21.73:6443: connect: connection refused" node="ip-172-31-21-73" May 10 00:49:47.696861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3188108354.mount: Deactivated successfully. May 10 00:49:47.715798 env[1773]: time="2025-05-10T00:49:47.715757105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.718182 env[1773]: time="2025-05-10T00:49:47.718140567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.723022 env[1773]: time="2025-05-10T00:49:47.722981377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.726689 env[1773]: time="2025-05-10T00:49:47.726647881Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.728618 env[1773]: time="2025-05-10T00:49:47.728588766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.732534 env[1773]: time="2025-05-10T00:49:47.732481292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.734771 env[1773]: time="2025-05-10T00:49:47.734737120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.737521 env[1773]: time="2025-05-10T00:49:47.737470297Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.739402 env[1773]: time="2025-05-10T00:49:47.739372229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.741008 env[1773]: time="2025-05-10T00:49:47.740979237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.743077 env[1773]: time="2025-05-10T00:49:47.743044868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.748719 env[1773]: time="2025-05-10T00:49:47.748682092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.807379 env[1773]: time="2025-05-10T00:49:47.797308587Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:47.807379 env[1773]: time="2025-05-10T00:49:47.797361099Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:47.807379 env[1773]: time="2025-05-10T00:49:47.797371931Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:47.807379 env[1773]: time="2025-05-10T00:49:47.797539853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95897a99576018cdb346d6fe56be866b78d1e6d44f41edbc5c040d5ea1bdd9b2 pid=2470 runtime=io.containerd.runc.v2 May 10 00:49:47.809109 env[1773]: time="2025-05-10T00:49:47.798389805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:47.809109 env[1773]: time="2025-05-10T00:49:47.798419107Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:47.809109 env[1773]: time="2025-05-10T00:49:47.798428888Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:47.809109 env[1773]: time="2025-05-10T00:49:47.798616313Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52871be8268052a2fff9454b6d2eb0fcbdd433cb657b398a9f8cab6042496411 pid=2471 runtime=io.containerd.runc.v2 May 10 00:49:47.836013 env[1773]: time="2025-05-10T00:49:47.835919551Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:47.836299 env[1773]: time="2025-05-10T00:49:47.836267160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:47.836440 env[1773]: time="2025-05-10T00:49:47.836415090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:47.836851 env[1773]: time="2025-05-10T00:49:47.836803383Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cda085209a40fa1d65bba533c277447f7dd16b58c79e1a589cc7689ab066ca29 pid=2509 runtime=io.containerd.runc.v2 May 10 00:49:47.902312 kubelet[2423]: W0510 00:49:47.902208 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.21.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:47.902312 kubelet[2423]: E0510 00:49:47.902291 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.21.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:47.944124 env[1773]: time="2025-05-10T00:49:47.942136071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-21-73,Uid:60cc5bc082f77e22ef7b6f024c53c30c,Namespace:kube-system,Attempt:0,} returns sandbox id \"95897a99576018cdb346d6fe56be866b78d1e6d44f41edbc5c040d5ea1bdd9b2\"" May 10 00:49:47.970923 env[1773]: time="2025-05-10T00:49:47.969853976Z" level=info msg="CreateContainer within sandbox \"95897a99576018cdb346d6fe56be866b78d1e6d44f41edbc5c040d5ea1bdd9b2\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:49:47.971921 env[1773]: time="2025-05-10T00:49:47.971873742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-21-73,Uid:e1879c12a840f1068d616af74218b943,Namespace:kube-system,Attempt:0,} returns sandbox id \"52871be8268052a2fff9454b6d2eb0fcbdd433cb657b398a9f8cab6042496411\"" May 10 00:49:47.973713 env[1773]: time="2025-05-10T00:49:47.973673232Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-21-73,Uid:ab5dec989cdcbac92afa69a96708b5b6,Namespace:kube-system,Attempt:0,} returns sandbox id \"cda085209a40fa1d65bba533c277447f7dd16b58c79e1a589cc7689ab066ca29\"" May 10 00:49:47.975922 env[1773]: time="2025-05-10T00:49:47.975867625Z" level=info msg="CreateContainer within sandbox \"52871be8268052a2fff9454b6d2eb0fcbdd433cb657b398a9f8cab6042496411\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:49:47.977336 kubelet[2423]: W0510 00:49:47.977277 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.21.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-73&limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:47.977336 kubelet[2423]: E0510 00:49:47.977344 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.21.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-21-73&limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:47.978090 env[1773]: time="2025-05-10T00:49:47.978052253Z" level=info msg="CreateContainer within sandbox \"cda085209a40fa1d65bba533c277447f7dd16b58c79e1a589cc7689ab066ca29\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:49:48.017936 env[1773]: time="2025-05-10T00:49:48.017878494Z" level=info msg="CreateContainer within sandbox \"95897a99576018cdb346d6fe56be866b78d1e6d44f41edbc5c040d5ea1bdd9b2\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b65126af14c07f365ea832c016fa17bf3ecb9d73252a8c214c3bd1179cad99b7\"" May 10 00:49:48.018704 env[1773]: time="2025-05-10T00:49:48.018667329Z" level=info msg="StartContainer for \"b65126af14c07f365ea832c016fa17bf3ecb9d73252a8c214c3bd1179cad99b7\"" May 10 00:49:48.029020 env[1773]: time="2025-05-10T00:49:48.028967205Z" level=info msg="CreateContainer within sandbox \"52871be8268052a2fff9454b6d2eb0fcbdd433cb657b398a9f8cab6042496411\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562\"" May 10 00:49:48.029687 env[1773]: time="2025-05-10T00:49:48.029653891Z" level=info msg="CreateContainer within sandbox \"cda085209a40fa1d65bba533c277447f7dd16b58c79e1a589cc7689ab066ca29\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28\"" May 10 00:49:48.029824 env[1773]: time="2025-05-10T00:49:48.029752114Z" level=info msg="StartContainer for \"1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562\"" May 10 00:49:48.033044 env[1773]: time="2025-05-10T00:49:48.033007641Z" level=info msg="StartContainer for \"6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28\"" May 10 00:49:48.090184 kubelet[2423]: W0510 00:49:48.083919 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.21.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:48.090184 kubelet[2423]: E0510 00:49:48.083998 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.21.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:48.145844 env[1773]: time="2025-05-10T00:49:48.145787320Z" level=info msg="StartContainer for \"b65126af14c07f365ea832c016fa17bf3ecb9d73252a8c214c3bd1179cad99b7\" returns successfully" May 10 00:49:48.150248 kubelet[2423]: E0510 00:49:48.150165 2423 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.21.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-73?timeout=10s\": dial tcp 172.31.21.73:6443: connect: connection refused" interval="1.6s" May 10 00:49:48.173320 env[1773]: time="2025-05-10T00:49:48.173263441Z" level=info msg="StartContainer for \"1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562\" returns successfully" May 10 00:49:48.223744 env[1773]: time="2025-05-10T00:49:48.223627567Z" level=info msg="StartContainer for \"6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28\" returns successfully" May 10 00:49:48.240981 kubelet[2423]: I0510 00:49:48.240952 2423 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-21-73" May 10 00:49:48.241328 kubelet[2423]: E0510 00:49:48.241300 2423 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.21.73:6443/api/v1/nodes\": dial tcp 172.31.21.73:6443: connect: connection refused" node="ip-172-31-21-73" May 10 00:49:48.306156 kubelet[2423]: W0510 00:49:48.306077 2423 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.21.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:48.306156 kubelet[2423]: E0510 00:49:48.306156 2423 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.21.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:48.776006 kubelet[2423]: E0510 00:49:48.775967 2423 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.21.73:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.21.73:6443: connect: connection refused May 10 00:49:49.843673 kubelet[2423]: I0510 00:49:49.843643 2423 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-21-73" May 10 00:49:50.972879 kubelet[2423]: E0510 00:49:50.972838 2423 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-21-73\" not found" node="ip-172-31-21-73" May 10 00:49:51.030094 kubelet[2423]: I0510 00:49:51.030064 2423 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-21-73" May 10 00:49:51.695849 kubelet[2423]: I0510 00:49:51.695812 2423 apiserver.go:52] "Watching apiserver" May 10 00:49:51.737587 kubelet[2423]: I0510 00:49:51.737372 2423 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:49:51.742616 kubelet[2423]: E0510 00:49:51.742578 2423 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-21-73\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ip-172-31-21-73" May 10 00:49:53.189159 systemd[1]: Reloading. May 10 00:49:53.301723 /usr/lib/systemd/system-generators/torcx-generator[2718]: time="2025-05-10T00:49:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:53.309681 /usr/lib/systemd/system-generators/torcx-generator[2718]: time="2025-05-10T00:49:53Z" level=info msg="torcx already run" May 10 00:49:53.414959 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:53.414985 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:53.436591 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:53.550609 systemd[1]: Stopping kubelet.service... May 10 00:49:53.551332 kubelet[2423]: E0510 00:49:53.550599 2423 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ip-172-31-21-73.183e04135e8da8d0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-21-73,UID:ip-172-31-21-73,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-21-73,},FirstTimestamp:2025-05-10 00:49:46.70356296 +0000 UTC m=+0.459769732,LastTimestamp:2025-05-10 00:49:46.70356296 +0000 UTC m=+0.459769732,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-21-73,}" May 10 00:49:53.574400 kernel: kauditd_printk_skb: 43 callbacks suppressed May 10 00:49:53.575180 kernel: audit: type=1131 audit(1746838193.568:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:53.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:53.570041 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:49:53.570330 systemd[1]: Stopped kubelet.service. May 10 00:49:53.573766 systemd[1]: Starting kubelet.service... May 10 00:49:54.541893 systemd[1]: Started kubelet.service. May 10 00:49:54.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:54.548502 kernel: audit: type=1130 audit(1746838194.540:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:54.646133 kubelet[2789]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:54.646133 kubelet[2789]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:49:54.646133 kubelet[2789]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:54.646631 kubelet[2789]: I0510 00:49:54.646590 2789 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:49:54.657463 kubelet[2789]: I0510 00:49:54.657425 2789 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:49:54.657463 kubelet[2789]: I0510 00:49:54.657469 2789 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:49:54.658682 kubelet[2789]: I0510 00:49:54.657779 2789 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:49:54.659663 kubelet[2789]: I0510 00:49:54.659636 2789 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:49:54.661522 kubelet[2789]: I0510 00:49:54.661470 2789 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:49:54.671047 kubelet[2789]: I0510 00:49:54.670342 2789 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:49:54.672421 kubelet[2789]: I0510 00:49:54.671974 2789 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:49:54.672421 kubelet[2789]: I0510 00:49:54.672020 2789 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-21-73","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:49:54.672421 kubelet[2789]: I0510 00:49:54.672340 2789 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:49:54.672421 kubelet[2789]: I0510 00:49:54.672399 2789 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:49:54.672765 kubelet[2789]: I0510 00:49:54.672468 2789 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:54.677056 kubelet[2789]: I0510 00:49:54.677021 2789 kubelet.go:400] "Attempting to sync node with API server" May 10 00:49:54.677601 kubelet[2789]: I0510 00:49:54.677580 2789 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:49:54.677758 kubelet[2789]: I0510 00:49:54.677748 2789 kubelet.go:312] "Adding apiserver pod source" May 10 00:49:54.677876 kubelet[2789]: I0510 00:49:54.677865 2789 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:49:54.687744 kubelet[2789]: I0510 00:49:54.687721 2789 apiserver.go:52] "Watching apiserver" May 10 00:49:54.689667 kubelet[2789]: I0510 00:49:54.687752 2789 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:49:54.690047 kubelet[2789]: I0510 00:49:54.690029 2789 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:49:54.691915 kubelet[2789]: I0510 00:49:54.691893 2789 server.go:1264] "Started kubelet" May 10 00:49:54.711537 kubelet[2789]: I0510 00:49:54.711475 2789 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:49:54.716438 kubelet[2789]: I0510 00:49:54.712006 2789 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:49:54.716438 kubelet[2789]: I0510 00:49:54.712402 2789 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:49:54.725827 kernel: audit: type=1400 audit(1746838194.715:231): avc: denied { mac_admin } for pid=2789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:54.715000 audit[2789]: AVC avc: denied { mac_admin } for pid=2789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:54.736951 kernel: audit: type=1401 audit(1746838194.715:231): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:54.715000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:54.737152 kubelet[2789]: I0510 00:49:54.728790 2789 server.go:455] "Adding debug handlers to kubelet server" May 10 00:49:54.746209 kubelet[2789]: I0510 00:49:54.746162 2789 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:49:54.746471 kubelet[2789]: I0510 00:49:54.746441 2789 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:49:54.759428 kernel: audit: type=1300 audit(1746838194.715:231): arch=c000003e syscall=188 success=no exit=-22 a0=c000c50fc0 a1=c000b59848 a2=c000c50f90 a3=25 items=0 ppid=1 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.715000 audit[2789]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c50fc0 a1=c000b59848 a2=c000c50f90 a3=25 items=0 ppid=1 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.772513 kernel: audit: type=1327 audit(1746838194.715:231): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:54.715000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:54.772849 kubelet[2789]: I0510 00:49:54.772826 2789 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:49:54.777641 kubelet[2789]: I0510 00:49:54.777617 2789 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:49:54.778981 kubelet[2789]: I0510 00:49:54.778960 2789 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:49:54.780649 kubelet[2789]: I0510 00:49:54.780631 2789 reconciler.go:26] "Reconciler: start to sync state" May 10 00:49:54.744000 audit[2789]: AVC avc: denied { mac_admin } for pid=2789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:54.790506 kernel: audit: type=1400 audit(1746838194.744:232): avc: denied { mac_admin } for pid=2789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:54.791427 kubelet[2789]: I0510 00:49:54.791401 2789 factory.go:221] Registration of the systemd container factory successfully May 10 00:49:54.792553 kubelet[2789]: I0510 00:49:54.792440 2789 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:49:54.801662 kubelet[2789]: I0510 00:49:54.801636 2789 factory.go:221] Registration of the containerd container factory successfully May 10 00:49:54.816921 kernel: audit: type=1401 audit(1746838194.744:232): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:54.744000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:54.744000 audit[2789]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6d8e0 a1=c000b59ab8 a2=c000c51d40 a3=25 items=0 ppid=1 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.831385 kernel: audit: type=1300 audit(1746838194.744:232): arch=c000003e syscall=188 success=no exit=-22 a0=c000b6d8e0 a1=c000b59ab8 a2=c000c51d40 a3=25 items=0 ppid=1 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.744000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:54.843510 kernel: audit: type=1327 audit(1746838194.744:232): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:54.847459 kubelet[2789]: I0510 00:49:54.845436 2789 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:49:54.847459 kubelet[2789]: I0510 00:49:54.846933 2789 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:49:54.847459 kubelet[2789]: I0510 00:49:54.846970 2789 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:49:54.847459 kubelet[2789]: I0510 00:49:54.846994 2789 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:49:54.847459 kubelet[2789]: E0510 00:49:54.847044 2789 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:49:54.881684 kubelet[2789]: I0510 00:49:54.881655 2789 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-21-73" May 10 00:49:54.900734 kubelet[2789]: I0510 00:49:54.898742 2789 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-21-73" May 10 00:49:54.900734 kubelet[2789]: I0510 00:49:54.898831 2789 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-21-73" May 10 00:49:54.947396 kubelet[2789]: E0510 00:49:54.947351 2789 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:49:54.952383 kubelet[2789]: I0510 00:49:54.952352 2789 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:49:54.952383 kubelet[2789]: I0510 00:49:54.952371 2789 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:49:54.952611 kubelet[2789]: I0510 00:49:54.952393 2789 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:54.953788 kubelet[2789]: I0510 00:49:54.953761 2789 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:49:54.953894 kubelet[2789]: I0510 00:49:54.953781 2789 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:49:54.953894 kubelet[2789]: I0510 00:49:54.953808 2789 policy_none.go:49] "None policy: Start" May 10 00:49:54.955681 kubelet[2789]: I0510 00:49:54.954570 2789 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:49:54.955802 kubelet[2789]: I0510 00:49:54.955686 2789 state_mem.go:35] "Initializing new in-memory state store" May 10 00:49:54.955988 kubelet[2789]: I0510 00:49:54.955966 2789 state_mem.go:75] "Updated machine memory state" May 10 00:49:54.959085 kubelet[2789]: I0510 00:49:54.959034 2789 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:49:54.957000 audit[2789]: AVC avc: denied { mac_admin } for pid=2789 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:54.957000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:54.957000 audit[2789]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00051ac60 a1=c000ccbf20 a2=c00051ab40 a3=25 items=0 ppid=1 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.957000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:54.959519 kubelet[2789]: I0510 00:49:54.959163 2789 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:49:54.961229 kubelet[2789]: I0510 00:49:54.959385 2789 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:49:54.962134 kubelet[2789]: I0510 00:49:54.961562 2789 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:49:55.147750 kubelet[2789]: I0510 00:49:55.147699 2789 topology_manager.go:215] "Topology Admit Handler" podUID="60cc5bc082f77e22ef7b6f024c53c30c" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-21-73" May 10 00:49:55.147910 kubelet[2789]: I0510 00:49:55.147875 2789 topology_manager.go:215] "Topology Admit Handler" podUID="e1879c12a840f1068d616af74218b943" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-21-73" May 10 00:49:55.147966 kubelet[2789]: I0510 00:49:55.147951 2789 topology_manager.go:215] "Topology Admit Handler" podUID="ab5dec989cdcbac92afa69a96708b5b6" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-21-73" May 10 00:49:55.180260 kubelet[2789]: I0510 00:49:55.180219 2789 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:49:55.185201 kubelet[2789]: I0510 00:49:55.184033 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/60cc5bc082f77e22ef7b6f024c53c30c-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-21-73\" (UID: \"60cc5bc082f77e22ef7b6f024c53c30c\") " pod="kube-system/kube-apiserver-ip-172-31-21-73" May 10 00:49:55.185201 kubelet[2789]: I0510 00:49:55.184073 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:55.185201 kubelet[2789]: I0510 00:49:55.184211 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-k8s-certs\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:55.185201 kubelet[2789]: I0510 00:49:55.184234 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-kubeconfig\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:55.185201 kubelet[2789]: I0510 00:49:55.184250 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:55.185458 kubelet[2789]: I0510 00:49:55.184266 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ab5dec989cdcbac92afa69a96708b5b6-kubeconfig\") pod \"kube-scheduler-ip-172-31-21-73\" (UID: \"ab5dec989cdcbac92afa69a96708b5b6\") " pod="kube-system/kube-scheduler-ip-172-31-21-73" May 10 00:49:55.185458 kubelet[2789]: I0510 00:49:55.184282 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/60cc5bc082f77e22ef7b6f024c53c30c-ca-certs\") pod \"kube-apiserver-ip-172-31-21-73\" (UID: \"60cc5bc082f77e22ef7b6f024c53c30c\") " pod="kube-system/kube-apiserver-ip-172-31-21-73" May 10 00:49:55.185458 kubelet[2789]: I0510 00:49:55.184302 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/60cc5bc082f77e22ef7b6f024c53c30c-k8s-certs\") pod \"kube-apiserver-ip-172-31-21-73\" (UID: \"60cc5bc082f77e22ef7b6f024c53c30c\") " pod="kube-system/kube-apiserver-ip-172-31-21-73" May 10 00:49:55.185458 kubelet[2789]: I0510 00:49:55.184320 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e1879c12a840f1068d616af74218b943-ca-certs\") pod \"kube-controller-manager-ip-172-31-21-73\" (UID: \"e1879c12a840f1068d616af74218b943\") " pod="kube-system/kube-controller-manager-ip-172-31-21-73" May 10 00:49:55.971241 kubelet[2789]: I0510 00:49:55.971171 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-21-73" podStartSLOduration=0.971153854 podStartE2EDuration="971.153854ms" podCreationTimestamp="2025-05-10 00:49:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:55.944000686 +0000 UTC m=+1.377329083" watchObservedRunningTime="2025-05-10 00:49:55.971153854 +0000 UTC m=+1.404482238" May 10 00:49:55.988453 kubelet[2789]: I0510 00:49:55.988403 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-21-73" podStartSLOduration=0.988375516 podStartE2EDuration="988.375516ms" podCreationTimestamp="2025-05-10 00:49:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:55.972701533 +0000 UTC m=+1.406029911" watchObservedRunningTime="2025-05-10 00:49:55.988375516 +0000 UTC m=+1.421703903" May 10 00:49:56.010265 kubelet[2789]: I0510 00:49:56.010198 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-21-73" podStartSLOduration=1.010166429 podStartE2EDuration="1.010166429s" podCreationTimestamp="2025-05-10 00:49:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:55.989483378 +0000 UTC m=+1.422811771" watchObservedRunningTime="2025-05-10 00:49:56.010166429 +0000 UTC m=+1.443494820" May 10 00:49:58.713099 amazon-ssm-agent[1737]: 2025-05-10 00:49:58 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 10 00:50:00.228372 update_engine[1766]: I0510 00:50:00.227913 1766 update_attempter.cc:509] Updating boot flags... May 10 00:50:00.497000 audit[2063]: USER_END pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:00.498524 sudo[2063]: pam_unix(sudo:session): session closed for user root May 10 00:50:00.502121 kernel: kauditd_printk_skb: 4 callbacks suppressed May 10 00:50:00.502227 kernel: audit: type=1106 audit(1746838200.497:234): pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:00.497000 audit[2063]: CRED_DISP pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:00.516515 kernel: audit: type=1104 audit(1746838200.497:235): pid=2063 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:00.539646 sshd[2059]: pam_unix(sshd:session): session closed for user core May 10 00:50:00.540000 audit[2059]: USER_END pid=2059 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:00.543128 systemd[1]: sshd@6-172.31.21.73:22-139.178.89.65:48974.service: Deactivated successfully. May 10 00:50:00.544372 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:50:00.546944 systemd-logind[1758]: Session 7 logged out. Waiting for processes to exit. May 10 00:50:00.548738 systemd-logind[1758]: Removed session 7. May 10 00:50:00.540000 audit[2059]: CRED_DISP pid=2059 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:00.562166 kernel: audit: type=1106 audit(1746838200.540:236): pid=2059 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:00.562304 kernel: audit: type=1104 audit(1746838200.540:237): pid=2059 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:00.562339 kernel: audit: type=1131 audit(1746838200.541:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.73:22-139.178.89.65:48974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:00.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.21.73:22-139.178.89.65:48974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:06.602353 kubelet[2789]: I0510 00:50:06.602301 2789 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:50:06.602961 env[1773]: time="2025-05-10T00:50:06.602835756Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:50:06.603323 kubelet[2789]: I0510 00:50:06.603148 2789 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:50:07.143151 kubelet[2789]: I0510 00:50:07.143104 2789 topology_manager.go:215] "Topology Admit Handler" podUID="cdc18ab0-8419-41b1-9573-5a9d7a585154" podNamespace="kube-system" podName="kube-proxy-jlh52" May 10 00:50:07.152403 kubelet[2789]: I0510 00:50:07.152197 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cdc18ab0-8419-41b1-9573-5a9d7a585154-kube-proxy\") pod \"kube-proxy-jlh52\" (UID: \"cdc18ab0-8419-41b1-9573-5a9d7a585154\") " pod="kube-system/kube-proxy-jlh52" May 10 00:50:07.152725 kubelet[2789]: I0510 00:50:07.152707 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cdc18ab0-8419-41b1-9573-5a9d7a585154-xtables-lock\") pod \"kube-proxy-jlh52\" (UID: \"cdc18ab0-8419-41b1-9573-5a9d7a585154\") " pod="kube-system/kube-proxy-jlh52" May 10 00:50:07.152877 kubelet[2789]: I0510 00:50:07.152864 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cdc18ab0-8419-41b1-9573-5a9d7a585154-lib-modules\") pod \"kube-proxy-jlh52\" (UID: \"cdc18ab0-8419-41b1-9573-5a9d7a585154\") " pod="kube-system/kube-proxy-jlh52" May 10 00:50:07.153058 kubelet[2789]: I0510 00:50:07.153046 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-872jt\" (UniqueName: \"kubernetes.io/projected/cdc18ab0-8419-41b1-9573-5a9d7a585154-kube-api-access-872jt\") pod \"kube-proxy-jlh52\" (UID: \"cdc18ab0-8419-41b1-9573-5a9d7a585154\") " pod="kube-system/kube-proxy-jlh52" May 10 00:50:07.357205 kubelet[2789]: I0510 00:50:07.357170 2789 topology_manager.go:215] "Topology Admit Handler" podUID="63848f8a-9b85-4383-8377-08a58ba11c5d" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-7l2xs" May 10 00:50:07.447111 env[1773]: time="2025-05-10T00:50:07.447001269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jlh52,Uid:cdc18ab0-8419-41b1-9573-5a9d7a585154,Namespace:kube-system,Attempt:0,}" May 10 00:50:07.454340 kubelet[2789]: I0510 00:50:07.454301 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/63848f8a-9b85-4383-8377-08a58ba11c5d-var-lib-calico\") pod \"tigera-operator-797db67f8-7l2xs\" (UID: \"63848f8a-9b85-4383-8377-08a58ba11c5d\") " pod="tigera-operator/tigera-operator-797db67f8-7l2xs" May 10 00:50:07.454340 kubelet[2789]: I0510 00:50:07.454341 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cnvvz\" (UniqueName: \"kubernetes.io/projected/63848f8a-9b85-4383-8377-08a58ba11c5d-kube-api-access-cnvvz\") pod \"tigera-operator-797db67f8-7l2xs\" (UID: \"63848f8a-9b85-4383-8377-08a58ba11c5d\") " pod="tigera-operator/tigera-operator-797db67f8-7l2xs" May 10 00:50:07.477653 env[1773]: time="2025-05-10T00:50:07.477576571Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:07.477653 env[1773]: time="2025-05-10T00:50:07.477620828Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:07.477871 env[1773]: time="2025-05-10T00:50:07.477631631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:07.477871 env[1773]: time="2025-05-10T00:50:07.477760186Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/615ac33f7704d010c48bb99aeb59a1ca5c2151192ec5edaec00966870ab066b3 pid=2967 runtime=io.containerd.runc.v2 May 10 00:50:07.518378 env[1773]: time="2025-05-10T00:50:07.518084944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jlh52,Uid:cdc18ab0-8419-41b1-9573-5a9d7a585154,Namespace:kube-system,Attempt:0,} returns sandbox id \"615ac33f7704d010c48bb99aeb59a1ca5c2151192ec5edaec00966870ab066b3\"" May 10 00:50:07.520983 env[1773]: time="2025-05-10T00:50:07.520797021Z" level=info msg="CreateContainer within sandbox \"615ac33f7704d010c48bb99aeb59a1ca5c2151192ec5edaec00966870ab066b3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:50:07.552544 env[1773]: time="2025-05-10T00:50:07.552467111Z" level=info msg="CreateContainer within sandbox \"615ac33f7704d010c48bb99aeb59a1ca5c2151192ec5edaec00966870ab066b3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1682ca58df3754b7553dd565a197fc156fddb94d02a4f0d46e34216213e989a0\"" May 10 00:50:07.554520 env[1773]: time="2025-05-10T00:50:07.553322215Z" level=info msg="StartContainer for \"1682ca58df3754b7553dd565a197fc156fddb94d02a4f0d46e34216213e989a0\"" May 10 00:50:07.636828 env[1773]: time="2025-05-10T00:50:07.636778317Z" level=info msg="StartContainer for \"1682ca58df3754b7553dd565a197fc156fddb94d02a4f0d46e34216213e989a0\" returns successfully" May 10 00:50:07.662559 env[1773]: time="2025-05-10T00:50:07.662515309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-7l2xs,Uid:63848f8a-9b85-4383-8377-08a58ba11c5d,Namespace:tigera-operator,Attempt:0,}" May 10 00:50:07.687111 env[1773]: time="2025-05-10T00:50:07.686912750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:07.687111 env[1773]: time="2025-05-10T00:50:07.686972666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:07.687111 env[1773]: time="2025-05-10T00:50:07.686990263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:07.687402 env[1773]: time="2025-05-10T00:50:07.687199698Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61ecb34b3da79f6b658c47ed58ac76b789680078a192bee515a945282ab34f5c pid=3041 runtime=io.containerd.runc.v2 May 10 00:50:07.757269 env[1773]: time="2025-05-10T00:50:07.756613607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-7l2xs,Uid:63848f8a-9b85-4383-8377-08a58ba11c5d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"61ecb34b3da79f6b658c47ed58ac76b789680078a192bee515a945282ab34f5c\"" May 10 00:50:07.761327 env[1773]: time="2025-05-10T00:50:07.761200455Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:50:08.102000 audit[3104]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.115961 kernel: audit: type=1325 audit(1746838208.102:239): table=mangle:38 family=2 entries=1 op=nft_register_chain pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.116083 kernel: audit: type=1300 audit(1746838208.102:239): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc82d03da0 a2=0 a3=7ffc82d03d8c items=0 ppid=3020 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.102000 audit[3104]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc82d03da0 a2=0 a3=7ffc82d03d8c items=0 ppid=3020 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:08.102000 audit[3105]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.124668 kernel: audit: type=1327 audit(1746838208.102:239): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:08.124766 kernel: audit: type=1325 audit(1746838208.102:240): table=nat:39 family=2 entries=1 op=nft_register_chain pid=3105 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.124799 kernel: audit: type=1300 audit(1746838208.102:240): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb6bb41c0 a2=0 a3=7ffeb6bb41ac items=0 ppid=3020 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.102000 audit[3105]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb6bb41c0 a2=0 a3=7ffeb6bb41ac items=0 ppid=3020 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.132650 kernel: audit: type=1327 audit(1746838208.102:240): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:08.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:08.136549 kernel: audit: type=1325 audit(1746838208.102:241): table=filter:40 family=2 entries=1 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.102000 audit[3106]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.102000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdcf741e0 a2=0 a3=7fffdcf741cc items=0 ppid=3020 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.148422 kernel: audit: type=1300 audit(1746838208.102:241): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdcf741e0 a2=0 a3=7fffdcf741cc items=0 ppid=3020 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:08.153977 kernel: audit: type=1327 audit(1746838208.102:241): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:08.154105 kernel: audit: type=1325 audit(1746838208.102:242): table=mangle:41 family=10 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.102000 audit[3107]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=3107 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.102000 audit[3107]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe67f37be0 a2=0 a3=7ffe67f37bcc items=0 ppid=3020 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:08.107000 audit[3108]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.107000 audit[3108]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd780068d0 a2=0 a3=7ffd780068bc items=0 ppid=3020 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:08.107000 audit[3109]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=3109 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.107000 audit[3109]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9abb3ca0 a2=0 a3=7ffc9abb3c8c items=0 ppid=3020 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.107000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:08.212000 audit[3110]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.212000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6c39b380 a2=0 a3=7fff6c39b36c items=0 ppid=3020 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:08.218000 audit[3112]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3112 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.218000 audit[3112]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd03ceb690 a2=0 a3=7ffd03ceb67c items=0 ppid=3020 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:50:08.227000 audit[3115]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3115 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.227000 audit[3115]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffec7410ac0 a2=0 a3=7ffec7410aac items=0 ppid=3020 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:50:08.229000 audit[3116]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.229000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb28c550 a2=0 a3=7ffeeb28c53c items=0 ppid=3020 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:08.232000 audit[3118]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.232000 audit[3118]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc72969dd0 a2=0 a3=7ffc72969dbc items=0 ppid=3020 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:08.233000 audit[3119]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.233000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1da40990 a2=0 a3=7fff1da4097c items=0 ppid=3020 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:08.236000 audit[3121]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.236000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffe0b28890 a2=0 a3=7fffe0b2887c items=0 ppid=3020 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:08.241000 audit[3124]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.241000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb69ab7e0 a2=0 a3=7ffcb69ab7cc items=0 ppid=3020 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:50:08.242000 audit[3125]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.242000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd447d9eb0 a2=0 a3=7ffd447d9e9c items=0 ppid=3020 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:08.245000 audit[3127]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.245000 audit[3127]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdade54dc0 a2=0 a3=7ffdade54dac items=0 ppid=3020 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:08.247000 audit[3128]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.247000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbcd3a200 a2=0 a3=7ffdbcd3a1ec items=0 ppid=3020 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:08.250000 audit[3130]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3130 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.250000 audit[3130]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc457aa790 a2=0 a3=7ffc457aa77c items=0 ppid=3020 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:08.255000 audit[3133]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3133 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.255000 audit[3133]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe535929e0 a2=0 a3=7ffe535929cc items=0 ppid=3020 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:08.260000 audit[3136]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3136 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.260000 audit[3136]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3fd23e80 a2=0 a3=7ffe3fd23e6c items=0 ppid=3020 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:08.262000 audit[3137]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.262000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe3c083880 a2=0 a3=7ffe3c08386c items=0 ppid=3020 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:08.273598 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1885070458.mount: Deactivated successfully. May 10 00:50:08.277000 audit[3139]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.277000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd55b21890 a2=0 a3=7ffd55b2187c items=0 ppid=3020 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:08.281000 audit[3142]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3142 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.281000 audit[3142]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0e5eb170 a2=0 a3=7ffe0e5eb15c items=0 ppid=3020 pid=3142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:08.283000 audit[3143]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.283000 audit[3143]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd58277ff0 a2=0 a3=7ffd58277fdc items=0 ppid=3020 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:08.286000 audit[3145]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:08.286000 audit[3145]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffef48350a0 a2=0 a3=7ffef483508c items=0 ppid=3020 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:08.330000 audit[3151]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:08.330000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc3de7c3d0 a2=0 a3=7ffc3de7c3bc items=0 ppid=3020 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:08.341000 audit[3151]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:08.341000 audit[3151]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc3de7c3d0 a2=0 a3=7ffc3de7c3bc items=0 ppid=3020 pid=3151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:08.343000 audit[3156]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.343000 audit[3156]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc95bd4b0 a2=0 a3=7fffc95bd49c items=0 ppid=3020 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:08.346000 audit[3158]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.346000 audit[3158]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfd097350 a2=0 a3=7ffdfd09733c items=0 ppid=3020 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:50:08.352000 audit[3161]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.352000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd2cec5df0 a2=0 a3=7ffd2cec5ddc items=0 ppid=3020 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:50:08.353000 audit[3162]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.353000 audit[3162]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe52076980 a2=0 a3=7ffe5207696c items=0 ppid=3020 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:08.356000 audit[3164]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.356000 audit[3164]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7637de90 a2=0 a3=7ffc7637de7c items=0 ppid=3020 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:08.361000 audit[3165]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.361000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff38875080 a2=0 a3=7fff3887506c items=0 ppid=3020 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:08.364000 audit[3167]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.364000 audit[3167]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3b181400 a2=0 a3=7fff3b1813ec items=0 ppid=3020 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:50:08.369000 audit[3170]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.369000 audit[3170]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe095c8500 a2=0 a3=7ffe095c84ec items=0 ppid=3020 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:08.370000 audit[3171]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.370000 audit[3171]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff990b5e40 a2=0 a3=7fff990b5e2c items=0 ppid=3020 pid=3171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:08.373000 audit[3173]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.373000 audit[3173]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd86a8f40 a2=0 a3=7fffd86a8f2c items=0 ppid=3020 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:08.374000 audit[3174]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.374000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8ca394b0 a2=0 a3=7fff8ca3949c items=0 ppid=3020 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:08.377000 audit[3176]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.377000 audit[3176]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb808d480 a2=0 a3=7ffcb808d46c items=0 ppid=3020 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:08.381000 audit[3179]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.381000 audit[3179]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc84283900 a2=0 a3=7ffc842838ec items=0 ppid=3020 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:08.385000 audit[3182]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.385000 audit[3182]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecd669160 a2=0 a3=7ffecd66914c items=0 ppid=3020 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:50:08.387000 audit[3183]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.387000 audit[3183]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd80c0a9c0 a2=0 a3=7ffd80c0a9ac items=0 ppid=3020 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:08.390000 audit[3185]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.390000 audit[3185]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe5a00e4c0 a2=0 a3=7ffe5a00e4ac items=0 ppid=3020 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:08.393000 audit[3188]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3188 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.393000 audit[3188]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd0f3ba1c0 a2=0 a3=7ffd0f3ba1ac items=0 ppid=3020 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.393000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:08.395000 audit[3189]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.395000 audit[3189]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcad701df0 a2=0 a3=7ffcad701ddc items=0 ppid=3020 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:08.398000 audit[3191]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.398000 audit[3191]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdf7f0bf40 a2=0 a3=7ffdf7f0bf2c items=0 ppid=3020 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:08.400000 audit[3192]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.400000 audit[3192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd243fa850 a2=0 a3=7ffd243fa83c items=0 ppid=3020 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:50:08.402000 audit[3194]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.402000 audit[3194]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc5d185f0 a2=0 a3=7ffcc5d185dc items=0 ppid=3020 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:08.406000 audit[3197]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:08.406000 audit[3197]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe87542450 a2=0 a3=7ffe8754243c items=0 ppid=3020 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:08.409000 audit[3199]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:08.409000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe2629fa60 a2=0 a3=7ffe2629fa4c items=0 ppid=3020 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.409000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:08.409000 audit[3199]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:08.409000 audit[3199]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe2629fa60 a2=0 a3=7ffe2629fa4c items=0 ppid=3020 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:08.409000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:09.849353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1748816495.mount: Deactivated successfully. May 10 00:50:15.057413 env[1773]: time="2025-05-10T00:50:15.057353582Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:15.061757 env[1773]: time="2025-05-10T00:50:15.061708796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:15.065213 env[1773]: time="2025-05-10T00:50:15.064955702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:15.071720 env[1773]: time="2025-05-10T00:50:15.071669268Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:50:15.073755 env[1773]: time="2025-05-10T00:50:15.072878667Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:15.079177 env[1773]: time="2025-05-10T00:50:15.079130302Z" level=info msg="CreateContainer within sandbox \"61ecb34b3da79f6b658c47ed58ac76b789680078a192bee515a945282ab34f5c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:50:15.103186 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1811552268.mount: Deactivated successfully. May 10 00:50:15.112250 env[1773]: time="2025-05-10T00:50:15.112051524Z" level=info msg="CreateContainer within sandbox \"61ecb34b3da79f6b658c47ed58ac76b789680078a192bee515a945282ab34f5c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c\"" May 10 00:50:15.117120 env[1773]: time="2025-05-10T00:50:15.114278733Z" level=info msg="StartContainer for \"57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c\"" May 10 00:50:15.196630 env[1773]: time="2025-05-10T00:50:15.196551732Z" level=info msg="StartContainer for \"57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c\" returns successfully" May 10 00:50:15.924900 kubelet[2789]: I0510 00:50:15.924854 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jlh52" podStartSLOduration=8.924837966 podStartE2EDuration="8.924837966s" podCreationTimestamp="2025-05-10 00:50:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:07.911002031 +0000 UTC m=+13.344330418" watchObservedRunningTime="2025-05-10 00:50:15.924837966 +0000 UTC m=+21.358166355" May 10 00:50:15.927060 kubelet[2789]: I0510 00:50:15.927002 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-7l2xs" podStartSLOduration=1.611150076 podStartE2EDuration="8.926984574s" podCreationTimestamp="2025-05-10 00:50:07 +0000 UTC" firstStartedPulling="2025-05-10 00:50:07.75913248 +0000 UTC m=+13.192460845" lastFinishedPulling="2025-05-10 00:50:15.074966974 +0000 UTC m=+20.508295343" observedRunningTime="2025-05-10 00:50:15.925958723 +0000 UTC m=+21.359287092" watchObservedRunningTime="2025-05-10 00:50:15.926984574 +0000 UTC m=+21.360312955" May 10 00:50:16.097161 systemd[1]: run-containerd-runc-k8s.io-57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c-runc.hCexvr.mount: Deactivated successfully. May 10 00:50:18.338000 audit[3239]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.342190 kernel: kauditd_printk_skb: 143 callbacks suppressed May 10 00:50:18.342333 kernel: audit: type=1325 audit(1746838218.338:290): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.338000 audit[3239]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffffb20e960 a2=0 a3=7ffffb20e94c items=0 ppid=3020 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.365528 kernel: audit: type=1300 audit(1746838218.338:290): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffffb20e960 a2=0 a3=7ffffb20e94c items=0 ppid=3020 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.372516 kernel: audit: type=1327 audit(1746838218.338:290): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.355000 audit[3239]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.355000 audit[3239]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffffb20e960 a2=0 a3=0 items=0 ppid=3020 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.393535 kernel: audit: type=1325 audit(1746838218.355:291): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.393696 kernel: audit: type=1300 audit(1746838218.355:291): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffffb20e960 a2=0 a3=0 items=0 ppid=3020 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.393740 kernel: audit: type=1327 audit(1746838218.355:291): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.393000 audit[3241]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.402737 kernel: audit: type=1325 audit(1746838218.393:292): table=filter:91 family=2 entries=17 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.393000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd8704c1c0 a2=0 a3=7ffd8704c1ac items=0 ppid=3020 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.411534 kernel: audit: type=1300 audit(1746838218.393:292): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd8704c1c0 a2=0 a3=7ffd8704c1ac items=0 ppid=3020 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.411692 kernel: audit: type=1327 audit(1746838218.393:292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.402000 audit[3241]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.420152 kernel: audit: type=1325 audit(1746838218.402:293): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:18.402000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd8704c1c0 a2=0 a3=0 items=0 ppid=3020 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:18.402000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:18.496763 kubelet[2789]: I0510 00:50:18.496717 2789 topology_manager.go:215] "Topology Admit Handler" podUID="d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" podNamespace="calico-system" podName="calico-typha-7d55fcf698-64ftf" May 10 00:50:18.605605 kubelet[2789]: I0510 00:50:18.605471 2789 topology_manager.go:215] "Topology Admit Handler" podUID="29901ea3-2927-49f5-9332-eceb7ed83f0e" podNamespace="calico-system" podName="calico-node-m7q6b" May 10 00:50:18.630911 kubelet[2789]: I0510 00:50:18.630872 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nwbg4\" (UniqueName: \"kubernetes.io/projected/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-kube-api-access-nwbg4\") pod \"calico-typha-7d55fcf698-64ftf\" (UID: \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\") " pod="calico-system/calico-typha-7d55fcf698-64ftf" May 10 00:50:18.630911 kubelet[2789]: I0510 00:50:18.630925 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-tigera-ca-bundle\") pod \"calico-typha-7d55fcf698-64ftf\" (UID: \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\") " pod="calico-system/calico-typha-7d55fcf698-64ftf" May 10 00:50:18.631146 kubelet[2789]: I0510 00:50:18.630950 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-typha-certs\") pod \"calico-typha-7d55fcf698-64ftf\" (UID: \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\") " pod="calico-system/calico-typha-7d55fcf698-64ftf" May 10 00:50:18.732227 kubelet[2789]: I0510 00:50:18.732178 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-lib-modules\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.736656 kubelet[2789]: I0510 00:50:18.736621 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-log-dir\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.736950 kubelet[2789]: I0510 00:50:18.736929 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/29901ea3-2927-49f5-9332-eceb7ed83f0e-node-certs\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.737086 kubelet[2789]: I0510 00:50:18.737070 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-run-calico\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.737240 kubelet[2789]: I0510 00:50:18.737192 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-bin-dir\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.737366 kubelet[2789]: I0510 00:50:18.737351 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-policysync\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.738971 kubelet[2789]: I0510 00:50:18.738940 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hzqmf\" (UniqueName: \"kubernetes.io/projected/29901ea3-2927-49f5-9332-eceb7ed83f0e-kube-api-access-hzqmf\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.749658 kubelet[2789]: I0510 00:50:18.749620 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-lib-calico\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.759236 kubelet[2789]: I0510 00:50:18.759202 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-xtables-lock\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.765713 kubelet[2789]: I0510 00:50:18.765666 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-net-dir\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.765918 kubelet[2789]: I0510 00:50:18.765899 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/29901ea3-2927-49f5-9332-eceb7ed83f0e-tigera-ca-bundle\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.786457 kubelet[2789]: I0510 00:50:18.786405 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-flexvol-driver-host\") pod \"calico-node-m7q6b\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " pod="calico-system/calico-node-m7q6b" May 10 00:50:18.786754 kubelet[2789]: I0510 00:50:18.750764 2789 topology_manager.go:215] "Topology Admit Handler" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" podNamespace="calico-system" podName="csi-node-driver-jd8tc" May 10 00:50:18.789247 kubelet[2789]: E0510 00:50:18.787525 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:18.887000 kubelet[2789]: I0510 00:50:18.886888 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/249fb49c-38b8-4d34-9673-4fa848de7e21-varrun\") pod \"csi-node-driver-jd8tc\" (UID: \"249fb49c-38b8-4d34-9673-4fa848de7e21\") " pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:18.887000 kubelet[2789]: I0510 00:50:18.886932 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/249fb49c-38b8-4d34-9673-4fa848de7e21-socket-dir\") pod \"csi-node-driver-jd8tc\" (UID: \"249fb49c-38b8-4d34-9673-4fa848de7e21\") " pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:18.887000 kubelet[2789]: I0510 00:50:18.886966 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/249fb49c-38b8-4d34-9673-4fa848de7e21-kubelet-dir\") pod \"csi-node-driver-jd8tc\" (UID: \"249fb49c-38b8-4d34-9673-4fa848de7e21\") " pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:18.887189 kubelet[2789]: I0510 00:50:18.887011 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kvw58\" (UniqueName: \"kubernetes.io/projected/249fb49c-38b8-4d34-9673-4fa848de7e21-kube-api-access-kvw58\") pod \"csi-node-driver-jd8tc\" (UID: \"249fb49c-38b8-4d34-9673-4fa848de7e21\") " pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:18.887189 kubelet[2789]: I0510 00:50:18.887058 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/249fb49c-38b8-4d34-9673-4fa848de7e21-registration-dir\") pod \"csi-node-driver-jd8tc\" (UID: \"249fb49c-38b8-4d34-9673-4fa848de7e21\") " pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:18.891994 kubelet[2789]: E0510 00:50:18.891963 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.891994 kubelet[2789]: W0510 00:50:18.891986 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.892188 kubelet[2789]: E0510 00:50:18.892008 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.899722 kubelet[2789]: E0510 00:50:18.899697 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.899722 kubelet[2789]: W0510 00:50:18.899724 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.899881 kubelet[2789]: E0510 00:50:18.899747 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.899963 kubelet[2789]: E0510 00:50:18.899951 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.899993 kubelet[2789]: W0510 00:50:18.899961 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.899993 kubelet[2789]: E0510 00:50:18.899978 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.900191 kubelet[2789]: E0510 00:50:18.900178 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.900191 kubelet[2789]: W0510 00:50:18.900189 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.900257 kubelet[2789]: E0510 00:50:18.900200 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.900387 kubelet[2789]: E0510 00:50:18.900375 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.900387 kubelet[2789]: W0510 00:50:18.900386 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.900448 kubelet[2789]: E0510 00:50:18.900394 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.921756 kubelet[2789]: E0510 00:50:18.921731 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.921908 kubelet[2789]: W0510 00:50:18.921894 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.921979 kubelet[2789]: E0510 00:50:18.921969 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.988610 kubelet[2789]: E0510 00:50:18.988583 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.988815 kubelet[2789]: W0510 00:50:18.988798 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.988912 kubelet[2789]: E0510 00:50:18.988898 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.989280 kubelet[2789]: E0510 00:50:18.989266 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.989384 kubelet[2789]: W0510 00:50:18.989372 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.989498 kubelet[2789]: E0510 00:50:18.989471 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.989763 kubelet[2789]: E0510 00:50:18.989746 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.989839 kubelet[2789]: W0510 00:50:18.989766 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.989839 kubelet[2789]: E0510 00:50:18.989785 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.990036 kubelet[2789]: E0510 00:50:18.990023 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.990036 kubelet[2789]: W0510 00:50:18.990036 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.990168 kubelet[2789]: E0510 00:50:18.990052 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.990288 kubelet[2789]: E0510 00:50:18.990275 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.990349 kubelet[2789]: W0510 00:50:18.990288 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.990349 kubelet[2789]: E0510 00:50:18.990303 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.990590 kubelet[2789]: E0510 00:50:18.990576 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.990590 kubelet[2789]: W0510 00:50:18.990590 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.990707 kubelet[2789]: E0510 00:50:18.990607 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.990854 kubelet[2789]: E0510 00:50:18.990841 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.990907 kubelet[2789]: W0510 00:50:18.990863 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.990907 kubelet[2789]: E0510 00:50:18.990879 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.991164 kubelet[2789]: E0510 00:50:18.991150 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.991233 kubelet[2789]: W0510 00:50:18.991165 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.991291 kubelet[2789]: E0510 00:50:18.991260 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.991445 kubelet[2789]: E0510 00:50:18.991431 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.991519 kubelet[2789]: W0510 00:50:18.991445 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.991566 kubelet[2789]: E0510 00:50:18.991552 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.991704 kubelet[2789]: E0510 00:50:18.991691 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.991757 kubelet[2789]: W0510 00:50:18.991705 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.991757 kubelet[2789]: E0510 00:50:18.991720 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.991953 kubelet[2789]: E0510 00:50:18.991936 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.992019 kubelet[2789]: W0510 00:50:18.991956 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.992019 kubelet[2789]: E0510 00:50:18.991972 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.992214 kubelet[2789]: E0510 00:50:18.992201 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.992271 kubelet[2789]: W0510 00:50:18.992214 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.992271 kubelet[2789]: E0510 00:50:18.992230 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.992524 kubelet[2789]: E0510 00:50:18.992511 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.992585 kubelet[2789]: W0510 00:50:18.992525 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.992638 kubelet[2789]: E0510 00:50:18.992613 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.992780 kubelet[2789]: E0510 00:50:18.992767 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.992834 kubelet[2789]: W0510 00:50:18.992780 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.992892 kubelet[2789]: E0510 00:50:18.992872 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.993063 kubelet[2789]: E0510 00:50:18.993049 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.993121 kubelet[2789]: W0510 00:50:18.993064 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.993176 kubelet[2789]: E0510 00:50:18.993148 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.993294 kubelet[2789]: E0510 00:50:18.993281 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.993349 kubelet[2789]: W0510 00:50:18.993295 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.993401 kubelet[2789]: E0510 00:50:18.993379 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.993536 kubelet[2789]: E0510 00:50:18.993524 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.993591 kubelet[2789]: W0510 00:50:18.993536 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.993591 kubelet[2789]: E0510 00:50:18.993553 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.994277 kubelet[2789]: E0510 00:50:18.994258 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.994277 kubelet[2789]: W0510 00:50:18.994275 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.994407 kubelet[2789]: E0510 00:50:18.994368 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.995591 kubelet[2789]: E0510 00:50:18.995553 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.995591 kubelet[2789]: W0510 00:50:18.995569 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.995763 kubelet[2789]: E0510 00:50:18.995675 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.995966 kubelet[2789]: E0510 00:50:18.995931 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.995966 kubelet[2789]: W0510 00:50:18.995945 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.996098 kubelet[2789]: E0510 00:50:18.996034 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.996218 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.999518 kubelet[2789]: W0510 00:50:18.996230 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.996408 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.999518 kubelet[2789]: W0510 00:50:18.996417 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.996429 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.996723 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.999518 kubelet[2789]: W0510 00:50:18.996734 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.996746 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.996980 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:18.999518 kubelet[2789]: E0510 00:50:18.997382 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:18.999994 kubelet[2789]: W0510 00:50:18.997394 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:18.999994 kubelet[2789]: E0510 00:50:18.997412 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:19.005311 kubelet[2789]: E0510 00:50:19.005290 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:19.005466 kubelet[2789]: W0510 00:50:19.005451 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:19.005614 kubelet[2789]: E0510 00:50:19.005599 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:19.019642 kubelet[2789]: E0510 00:50:19.019604 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:19.019811 kubelet[2789]: W0510 00:50:19.019795 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:19.019917 kubelet[2789]: E0510 00:50:19.019905 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:19.102670 env[1773]: time="2025-05-10T00:50:19.102346453Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d55fcf698-64ftf,Uid:d4a2f5b2-0835-4e13-bc5e-0846ca5a453f,Namespace:calico-system,Attempt:0,}" May 10 00:50:19.139735 env[1773]: time="2025-05-10T00:50:19.138161186Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:19.141695 env[1773]: time="2025-05-10T00:50:19.141628646Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:19.141848 env[1773]: time="2025-05-10T00:50:19.141711597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:19.142226 env[1773]: time="2025-05-10T00:50:19.142151618Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a pid=3288 runtime=io.containerd.runc.v2 May 10 00:50:19.212768 env[1773]: time="2025-05-10T00:50:19.212721428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m7q6b,Uid:29901ea3-2927-49f5-9332-eceb7ed83f0e,Namespace:calico-system,Attempt:0,}" May 10 00:50:19.241274 env[1773]: time="2025-05-10T00:50:19.240449155Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:19.241274 env[1773]: time="2025-05-10T00:50:19.240612052Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:19.241274 env[1773]: time="2025-05-10T00:50:19.240661406Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:19.241274 env[1773]: time="2025-05-10T00:50:19.240889512Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251 pid=3323 runtime=io.containerd.runc.v2 May 10 00:50:19.279198 env[1773]: time="2025-05-10T00:50:19.278657391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d55fcf698-64ftf,Uid:d4a2f5b2-0835-4e13-bc5e-0846ca5a453f,Namespace:calico-system,Attempt:0,} returns sandbox id \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\"" May 10 00:50:19.281850 env[1773]: time="2025-05-10T00:50:19.280685786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:50:19.307530 env[1773]: time="2025-05-10T00:50:19.307464436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-m7q6b,Uid:29901ea3-2927-49f5-9332-eceb7ed83f0e,Namespace:calico-system,Attempt:0,} returns sandbox id \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\"" May 10 00:50:19.425000 audit[3366]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:19.425000 audit[3366]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd2df88e20 a2=0 a3=7ffd2df88e0c items=0 ppid=3020 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:19.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:19.430000 audit[3366]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:19.430000 audit[3366]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd2df88e20 a2=0 a3=0 items=0 ppid=3020 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:19.430000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.848524 kubelet[2789]: E0510 00:50:20.847315 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:22.054122 env[1773]: time="2025-05-10T00:50:22.054073147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:22.056542 env[1773]: time="2025-05-10T00:50:22.056483081Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:22.058384 env[1773]: time="2025-05-10T00:50:22.058354418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:22.059830 env[1773]: time="2025-05-10T00:50:22.059799740Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:22.060540 env[1773]: time="2025-05-10T00:50:22.060499174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:50:22.064476 env[1773]: time="2025-05-10T00:50:22.064431622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:50:22.075864 env[1773]: time="2025-05-10T00:50:22.072622452Z" level=info msg="CreateContainer within sandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:50:22.094122 env[1773]: time="2025-05-10T00:50:22.094058329Z" level=info msg="CreateContainer within sandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\"" May 10 00:50:22.095713 env[1773]: time="2025-05-10T00:50:22.094720097Z" level=info msg="StartContainer for \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\"" May 10 00:50:22.192431 env[1773]: time="2025-05-10T00:50:22.192359098Z" level=info msg="StartContainer for \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\" returns successfully" May 10 00:50:22.848789 kubelet[2789]: E0510 00:50:22.848749 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:22.964848 kubelet[2789]: E0510 00:50:22.964805 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.965038 kubelet[2789]: W0510 00:50:22.964856 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.965038 kubelet[2789]: E0510 00:50:22.964888 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.965747 kubelet[2789]: E0510 00:50:22.965677 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.965747 kubelet[2789]: W0510 00:50:22.965699 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.966360 kubelet[2789]: E0510 00:50:22.965756 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.966474 kubelet[2789]: E0510 00:50:22.966465 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.966869 kubelet[2789]: W0510 00:50:22.966479 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.966869 kubelet[2789]: E0510 00:50:22.966626 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.967302 kubelet[2789]: E0510 00:50:22.967246 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.967523 kubelet[2789]: W0510 00:50:22.967305 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.967523 kubelet[2789]: E0510 00:50:22.967325 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.968139 kubelet[2789]: E0510 00:50:22.967958 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.968139 kubelet[2789]: W0510 00:50:22.968135 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.968539 kubelet[2789]: E0510 00:50:22.968154 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.968604 kubelet[2789]: E0510 00:50:22.968597 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.968654 kubelet[2789]: W0510 00:50:22.968607 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.968654 kubelet[2789]: E0510 00:50:22.968622 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.969233 kubelet[2789]: E0510 00:50:22.969218 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.969317 kubelet[2789]: W0510 00:50:22.969235 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.969317 kubelet[2789]: E0510 00:50:22.969249 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.969473 kubelet[2789]: E0510 00:50:22.969462 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.969473 kubelet[2789]: W0510 00:50:22.969473 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.969621 kubelet[2789]: E0510 00:50:22.969500 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.969796 kubelet[2789]: E0510 00:50:22.969784 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.969887 kubelet[2789]: W0510 00:50:22.969874 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.969958 kubelet[2789]: E0510 00:50:22.969947 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.970532 kubelet[2789]: E0510 00:50:22.970277 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.970532 kubelet[2789]: W0510 00:50:22.970289 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.970532 kubelet[2789]: E0510 00:50:22.970303 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.970727 kubelet[2789]: E0510 00:50:22.970589 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.970727 kubelet[2789]: W0510 00:50:22.970600 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.970727 kubelet[2789]: E0510 00:50:22.970613 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.970866 kubelet[2789]: E0510 00:50:22.970812 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.970866 kubelet[2789]: W0510 00:50:22.970820 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.970866 kubelet[2789]: E0510 00:50:22.970831 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.971025 kubelet[2789]: E0510 00:50:22.971015 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.971074 kubelet[2789]: W0510 00:50:22.971032 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.971074 kubelet[2789]: E0510 00:50:22.971044 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.971539 kubelet[2789]: E0510 00:50:22.971223 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.971539 kubelet[2789]: W0510 00:50:22.971233 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.971539 kubelet[2789]: E0510 00:50:22.971244 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:22.971539 kubelet[2789]: E0510 00:50:22.971421 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:22.971539 kubelet[2789]: W0510 00:50:22.971429 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:22.971539 kubelet[2789]: E0510 00:50:22.971439 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.021096 kubelet[2789]: E0510 00:50:23.021064 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.021096 kubelet[2789]: W0510 00:50:23.021088 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.021336 kubelet[2789]: E0510 00:50:23.021114 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.021537 kubelet[2789]: E0510 00:50:23.021512 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.021537 kubelet[2789]: W0510 00:50:23.021532 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.021704 kubelet[2789]: E0510 00:50:23.021556 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.021905 kubelet[2789]: E0510 00:50:23.021884 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.021994 kubelet[2789]: W0510 00:50:23.021901 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.021994 kubelet[2789]: E0510 00:50:23.021931 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.022231 kubelet[2789]: E0510 00:50:23.022217 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.022331 kubelet[2789]: W0510 00:50:23.022317 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.022426 kubelet[2789]: E0510 00:50:23.022407 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.022765 kubelet[2789]: E0510 00:50:23.022746 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.022765 kubelet[2789]: W0510 00:50:23.022761 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.022895 kubelet[2789]: E0510 00:50:23.022781 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.023100 kubelet[2789]: E0510 00:50:23.023075 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.023100 kubelet[2789]: W0510 00:50:23.023091 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.023237 kubelet[2789]: E0510 00:50:23.023106 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.023328 kubelet[2789]: E0510 00:50:23.023312 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.023328 kubelet[2789]: W0510 00:50:23.023326 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.023518 kubelet[2789]: E0510 00:50:23.023413 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.023618 kubelet[2789]: E0510 00:50:23.023587 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.023618 kubelet[2789]: W0510 00:50:23.023597 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.023780 kubelet[2789]: E0510 00:50:23.023683 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.023864 kubelet[2789]: E0510 00:50:23.023844 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.023864 kubelet[2789]: W0510 00:50:23.023853 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.023983 kubelet[2789]: E0510 00:50:23.023968 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.024294 kubelet[2789]: E0510 00:50:23.024248 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.024294 kubelet[2789]: W0510 00:50:23.024259 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.024294 kubelet[2789]: E0510 00:50:23.024278 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.024852 kubelet[2789]: E0510 00:50:23.024836 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.024956 kubelet[2789]: W0510 00:50:23.024931 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.025068 kubelet[2789]: E0510 00:50:23.024969 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.025252 kubelet[2789]: E0510 00:50:23.025234 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.025252 kubelet[2789]: W0510 00:50:23.025248 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.025367 kubelet[2789]: E0510 00:50:23.025339 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.025575 kubelet[2789]: E0510 00:50:23.025559 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.025575 kubelet[2789]: W0510 00:50:23.025572 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.025736 kubelet[2789]: E0510 00:50:23.025721 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.025853 kubelet[2789]: E0510 00:50:23.025775 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.025927 kubelet[2789]: W0510 00:50:23.025853 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.025927 kubelet[2789]: E0510 00:50:23.025868 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.026134 kubelet[2789]: E0510 00:50:23.026118 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.026134 kubelet[2789]: W0510 00:50:23.026131 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.026255 kubelet[2789]: E0510 00:50:23.026149 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.026547 kubelet[2789]: E0510 00:50:23.026529 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.026547 kubelet[2789]: W0510 00:50:23.026544 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.026676 kubelet[2789]: E0510 00:50:23.026562 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.026817 kubelet[2789]: E0510 00:50:23.026800 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.026817 kubelet[2789]: W0510 00:50:23.026814 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.026933 kubelet[2789]: E0510 00:50:23.026828 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.027550 kubelet[2789]: E0510 00:50:23.027531 2789 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.027550 kubelet[2789]: W0510 00:50:23.027546 2789 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.027653 kubelet[2789]: E0510 00:50:23.027560 2789 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.832835 env[1773]: time="2025-05-10T00:50:23.832790057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.835277 env[1773]: time="2025-05-10T00:50:23.835238398Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.837107 env[1773]: time="2025-05-10T00:50:23.837074229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.838884 env[1773]: time="2025-05-10T00:50:23.838851706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.839349 env[1773]: time="2025-05-10T00:50:23.839287780Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:50:23.845523 env[1773]: time="2025-05-10T00:50:23.842108008Z" level=info msg="CreateContainer within sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:50:23.864504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1696711100.mount: Deactivated successfully. May 10 00:50:23.866253 env[1773]: time="2025-05-10T00:50:23.865953851Z" level=info msg="CreateContainer within sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\"" May 10 00:50:23.868967 env[1773]: time="2025-05-10T00:50:23.866742458Z" level=info msg="StartContainer for \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\"" May 10 00:50:23.914707 systemd[1]: run-containerd-runc-k8s.io-e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53-runc.FsRPLN.mount: Deactivated successfully. May 10 00:50:23.931569 kubelet[2789]: I0510 00:50:23.931470 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:23.955505 env[1773]: time="2025-05-10T00:50:23.955447269Z" level=info msg="StartContainer for \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\" returns successfully" May 10 00:50:24.018259 env[1773]: time="2025-05-10T00:50:24.018202347Z" level=info msg="shim disconnected" id=e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53 May 10 00:50:24.018259 env[1773]: time="2025-05-10T00:50:24.018250424Z" level=warning msg="cleaning up after shim disconnected" id=e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53 namespace=k8s.io May 10 00:50:24.018259 env[1773]: time="2025-05-10T00:50:24.018260017Z" level=info msg="cleaning up dead shim" May 10 00:50:24.031632 env[1773]: time="2025-05-10T00:50:24.031581053Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3494 runtime=io.containerd.runc.v2\n" May 10 00:50:24.848365 kubelet[2789]: E0510 00:50:24.848325 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:24.856553 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53-rootfs.mount: Deactivated successfully. May 10 00:50:24.935912 env[1773]: time="2025-05-10T00:50:24.935883284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:50:24.954164 kubelet[2789]: I0510 00:50:24.952308 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7d55fcf698-64ftf" podStartSLOduration=4.169919946 podStartE2EDuration="6.952286601s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:19.280104776 +0000 UTC m=+24.713433147" lastFinishedPulling="2025-05-10 00:50:22.062471434 +0000 UTC m=+27.495799802" observedRunningTime="2025-05-10 00:50:22.942944849 +0000 UTC m=+28.376273236" watchObservedRunningTime="2025-05-10 00:50:24.952286601 +0000 UTC m=+30.385615049" May 10 00:50:26.850161 kubelet[2789]: E0510 00:50:26.848433 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:27.459458 kubelet[2789]: I0510 00:50:27.458701 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:27.530000 audit[3512]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:27.534183 kernel: kauditd_printk_skb: 8 callbacks suppressed May 10 00:50:27.534312 kernel: audit: type=1325 audit(1746838227.530:296): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:27.530000 audit[3512]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe770c0f90 a2=0 a3=7ffe770c0f7c items=0 ppid=3020 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:27.551427 kernel: audit: type=1300 audit(1746838227.530:296): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe770c0f90 a2=0 a3=7ffe770c0f7c items=0 ppid=3020 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:27.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:27.559129 kernel: audit: type=1327 audit(1746838227.530:296): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:27.556000 audit[3512]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:27.565501 kernel: audit: type=1325 audit(1746838227.556:297): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3512 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:27.556000 audit[3512]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe770c0f90 a2=0 a3=7ffe770c0f7c items=0 ppid=3020 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:27.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:27.585354 kernel: audit: type=1300 audit(1746838227.556:297): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe770c0f90 a2=0 a3=7ffe770c0f7c items=0 ppid=3020 pid=3512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:27.585558 kernel: audit: type=1327 audit(1746838227.556:297): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:28.848794 kubelet[2789]: E0510 00:50:28.848739 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:30.036955 env[1773]: time="2025-05-10T00:50:30.036893457Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.039152 env[1773]: time="2025-05-10T00:50:30.039107318Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.040922 env[1773]: time="2025-05-10T00:50:30.040853866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.042604 env[1773]: time="2025-05-10T00:50:30.042568936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.043238 env[1773]: time="2025-05-10T00:50:30.043189803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:50:30.047467 env[1773]: time="2025-05-10T00:50:30.047423347Z" level=info msg="CreateContainer within sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:50:30.078609 env[1773]: time="2025-05-10T00:50:30.078559976Z" level=info msg="CreateContainer within sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\"" May 10 00:50:30.080343 env[1773]: time="2025-05-10T00:50:30.079331838Z" level=info msg="StartContainer for \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\"" May 10 00:50:30.148932 env[1773]: time="2025-05-10T00:50:30.148886832Z" level=info msg="StartContainer for \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\" returns successfully" May 10 00:50:30.849181 kubelet[2789]: E0510 00:50:30.849137 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:30.902146 env[1773]: time="2025-05-10T00:50:30.902090417Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:50:30.928106 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e-rootfs.mount: Deactivated successfully. May 10 00:50:30.931110 kubelet[2789]: I0510 00:50:30.931015 2789 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:50:30.937753 env[1773]: time="2025-05-10T00:50:30.937704168Z" level=info msg="shim disconnected" id=9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e May 10 00:50:30.937753 env[1773]: time="2025-05-10T00:50:30.937752956Z" level=warning msg="cleaning up after shim disconnected" id=9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e namespace=k8s.io May 10 00:50:30.937753 env[1773]: time="2025-05-10T00:50:30.937766427Z" level=info msg="cleaning up dead shim" May 10 00:50:30.953380 env[1773]: time="2025-05-10T00:50:30.953336391Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3559 runtime=io.containerd.runc.v2\n" May 10 00:50:30.964552 env[1773]: time="2025-05-10T00:50:30.961782907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:50:30.970134 kubelet[2789]: I0510 00:50:30.970086 2789 topology_manager.go:215] "Topology Admit Handler" podUID="34494f4b-79ac-454b-9580-9ca26c3a43dc" podNamespace="kube-system" podName="coredns-7db6d8ff4d-xthsq" May 10 00:50:30.976951 kubelet[2789]: I0510 00:50:30.976914 2789 topology_manager.go:215] "Topology Admit Handler" podUID="39f79222-38bb-468f-b90b-4139334f1c3a" podNamespace="calico-apiserver" podName="calico-apiserver-6c4c664698-dv2zf" May 10 00:50:30.979774 kubelet[2789]: I0510 00:50:30.979738 2789 topology_manager.go:215] "Topology Admit Handler" podUID="ddb95e1e-8567-465e-85ac-1e86d059a924" podNamespace="calico-apiserver" podName="calico-apiserver-7b9fb45589-d24jc" May 10 00:50:31.012112 kubelet[2789]: I0510 00:50:31.012065 2789 topology_manager.go:215] "Topology Admit Handler" podUID="c77a7739-aefe-46a9-890c-f1b233600f13" podNamespace="kube-system" podName="coredns-7db6d8ff4d-56t4s" May 10 00:50:31.012416 kubelet[2789]: I0510 00:50:31.012386 2789 topology_manager.go:215] "Topology Admit Handler" podUID="bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" podNamespace="calico-apiserver" podName="calico-apiserver-6c4c664698-srrfv" May 10 00:50:31.012645 kubelet[2789]: I0510 00:50:31.012621 2789 topology_manager.go:215] "Topology Admit Handler" podUID="197a4730-7f05-4393-bd9a-f474f7cbde84" podNamespace="calico-system" podName="calico-kube-controllers-68d949dddc-k4hpq" May 10 00:50:31.083042 kubelet[2789]: I0510 00:50:31.083003 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ksk5b\" (UniqueName: \"kubernetes.io/projected/c77a7739-aefe-46a9-890c-f1b233600f13-kube-api-access-ksk5b\") pod \"coredns-7db6d8ff4d-56t4s\" (UID: \"c77a7739-aefe-46a9-890c-f1b233600f13\") " pod="kube-system/coredns-7db6d8ff4d-56t4s" May 10 00:50:31.083289 kubelet[2789]: I0510 00:50:31.083266 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qgxrl\" (UniqueName: \"kubernetes.io/projected/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-kube-api-access-qgxrl\") pod \"calico-apiserver-6c4c664698-srrfv\" (UID: \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\") " pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" May 10 00:50:31.083415 kubelet[2789]: I0510 00:50:31.083400 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39f79222-38bb-468f-b90b-4139334f1c3a-calico-apiserver-certs\") pod \"calico-apiserver-6c4c664698-dv2zf\" (UID: \"39f79222-38bb-468f-b90b-4139334f1c3a\") " pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" May 10 00:50:31.083552 kubelet[2789]: I0510 00:50:31.083533 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ddb95e1e-8567-465e-85ac-1e86d059a924-calico-apiserver-certs\") pod \"calico-apiserver-7b9fb45589-d24jc\" (UID: \"ddb95e1e-8567-465e-85ac-1e86d059a924\") " pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" May 10 00:50:31.083682 kubelet[2789]: I0510 00:50:31.083665 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fj9vv\" (UniqueName: \"kubernetes.io/projected/ddb95e1e-8567-465e-85ac-1e86d059a924-kube-api-access-fj9vv\") pod \"calico-apiserver-7b9fb45589-d24jc\" (UID: \"ddb95e1e-8567-465e-85ac-1e86d059a924\") " pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" May 10 00:50:31.083803 kubelet[2789]: I0510 00:50:31.083781 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p6qrq\" (UniqueName: \"kubernetes.io/projected/197a4730-7f05-4393-bd9a-f474f7cbde84-kube-api-access-p6qrq\") pod \"calico-kube-controllers-68d949dddc-k4hpq\" (UID: \"197a4730-7f05-4393-bd9a-f474f7cbde84\") " pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" May 10 00:50:31.083881 kubelet[2789]: I0510 00:50:31.083815 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-calico-apiserver-certs\") pod \"calico-apiserver-6c4c664698-srrfv\" (UID: \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\") " pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" May 10 00:50:31.083881 kubelet[2789]: I0510 00:50:31.083843 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c77a7739-aefe-46a9-890c-f1b233600f13-config-volume\") pod \"coredns-7db6d8ff4d-56t4s\" (UID: \"c77a7739-aefe-46a9-890c-f1b233600f13\") " pod="kube-system/coredns-7db6d8ff4d-56t4s" May 10 00:50:31.083881 kubelet[2789]: I0510 00:50:31.083870 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j8ps7\" (UniqueName: \"kubernetes.io/projected/39f79222-38bb-468f-b90b-4139334f1c3a-kube-api-access-j8ps7\") pod \"calico-apiserver-6c4c664698-dv2zf\" (UID: \"39f79222-38bb-468f-b90b-4139334f1c3a\") " pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" May 10 00:50:31.084086 kubelet[2789]: I0510 00:50:31.083935 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/197a4730-7f05-4393-bd9a-f474f7cbde84-tigera-ca-bundle\") pod \"calico-kube-controllers-68d949dddc-k4hpq\" (UID: \"197a4730-7f05-4393-bd9a-f474f7cbde84\") " pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" May 10 00:50:31.084086 kubelet[2789]: I0510 00:50:31.083967 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gvxbt\" (UniqueName: \"kubernetes.io/projected/34494f4b-79ac-454b-9580-9ca26c3a43dc-kube-api-access-gvxbt\") pod \"coredns-7db6d8ff4d-xthsq\" (UID: \"34494f4b-79ac-454b-9580-9ca26c3a43dc\") " pod="kube-system/coredns-7db6d8ff4d-xthsq" May 10 00:50:31.084086 kubelet[2789]: I0510 00:50:31.084000 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/34494f4b-79ac-454b-9580-9ca26c3a43dc-config-volume\") pod \"coredns-7db6d8ff4d-xthsq\" (UID: \"34494f4b-79ac-454b-9580-9ca26c3a43dc\") " pod="kube-system/coredns-7db6d8ff4d-xthsq" May 10 00:50:31.274576 env[1773]: time="2025-05-10T00:50:31.274456597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xthsq,Uid:34494f4b-79ac-454b-9580-9ca26c3a43dc,Namespace:kube-system,Attempt:0,}" May 10 00:50:31.292227 env[1773]: time="2025-05-10T00:50:31.291968846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b9fb45589-d24jc,Uid:ddb95e1e-8567-465e-85ac-1e86d059a924,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:31.323778 env[1773]: time="2025-05-10T00:50:31.323739231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-srrfv,Uid:bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:31.324204 env[1773]: time="2025-05-10T00:50:31.324166370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-56t4s,Uid:c77a7739-aefe-46a9-890c-f1b233600f13,Namespace:kube-system,Attempt:0,}" May 10 00:50:31.324550 env[1773]: time="2025-05-10T00:50:31.324521327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d949dddc-k4hpq,Uid:197a4730-7f05-4393-bd9a-f474f7cbde84,Namespace:calico-system,Attempt:0,}" May 10 00:50:31.327112 env[1773]: time="2025-05-10T00:50:31.327085962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-dv2zf,Uid:39f79222-38bb-468f-b90b-4139334f1c3a,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:31.644901 env[1773]: time="2025-05-10T00:50:31.644835365Z" level=error msg="Failed to destroy network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.645380 env[1773]: time="2025-05-10T00:50:31.645347268Z" level=error msg="encountered an error cleaning up failed sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.645530 env[1773]: time="2025-05-10T00:50:31.645483832Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xthsq,Uid:34494f4b-79ac-454b-9580-9ca26c3a43dc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.646219 kubelet[2789]: E0510 00:50:31.645790 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.646219 kubelet[2789]: E0510 00:50:31.645861 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xthsq" May 10 00:50:31.646219 kubelet[2789]: E0510 00:50:31.645882 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-xthsq" May 10 00:50:31.646386 kubelet[2789]: E0510 00:50:31.645928 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-xthsq_kube-system(34494f4b-79ac-454b-9580-9ca26c3a43dc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-xthsq_kube-system(34494f4b-79ac-454b-9580-9ca26c3a43dc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xthsq" podUID="34494f4b-79ac-454b-9580-9ca26c3a43dc" May 10 00:50:31.664820 env[1773]: time="2025-05-10T00:50:31.664513255Z" level=error msg="Failed to destroy network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.665651 env[1773]: time="2025-05-10T00:50:31.665607826Z" level=error msg="Failed to destroy network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.666033 env[1773]: time="2025-05-10T00:50:31.665904784Z" level=error msg="encountered an error cleaning up failed sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.666033 env[1773]: time="2025-05-10T00:50:31.665955076Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-srrfv,Uid:bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.666184 kubelet[2789]: E0510 00:50:31.666142 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.666244 kubelet[2789]: E0510 00:50:31.666194 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" May 10 00:50:31.666244 kubelet[2789]: E0510 00:50:31.666213 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" May 10 00:50:31.666309 kubelet[2789]: E0510 00:50:31.666263 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6c4c664698-srrfv_calico-apiserver(bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6c4c664698-srrfv_calico-apiserver(bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" podUID="bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" May 10 00:50:31.668129 env[1773]: time="2025-05-10T00:50:31.667956707Z" level=error msg="Failed to destroy network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.668587 env[1773]: time="2025-05-10T00:50:31.668553767Z" level=error msg="encountered an error cleaning up failed sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.668632 env[1773]: time="2025-05-10T00:50:31.668606832Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b9fb45589-d24jc,Uid:ddb95e1e-8567-465e-85ac-1e86d059a924,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.668813 kubelet[2789]: E0510 00:50:31.668783 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.668872 kubelet[2789]: E0510 00:50:31.668834 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" May 10 00:50:31.668872 kubelet[2789]: E0510 00:50:31.668854 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" May 10 00:50:31.668931 kubelet[2789]: E0510 00:50:31.668893 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7b9fb45589-d24jc_calico-apiserver(ddb95e1e-8567-465e-85ac-1e86d059a924)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7b9fb45589-d24jc_calico-apiserver(ddb95e1e-8567-465e-85ac-1e86d059a924)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" podUID="ddb95e1e-8567-465e-85ac-1e86d059a924" May 10 00:50:31.669028 env[1773]: time="2025-05-10T00:50:31.668996451Z" level=error msg="encountered an error cleaning up failed sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.669067 env[1773]: time="2025-05-10T00:50:31.669040787Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-56t4s,Uid:c77a7739-aefe-46a9-890c-f1b233600f13,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.669178 kubelet[2789]: E0510 00:50:31.669154 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.669216 kubelet[2789]: E0510 00:50:31.669189 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-56t4s" May 10 00:50:31.669216 kubelet[2789]: E0510 00:50:31.669204 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-56t4s" May 10 00:50:31.669281 kubelet[2789]: E0510 00:50:31.669232 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-56t4s_kube-system(c77a7739-aefe-46a9-890c-f1b233600f13)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-56t4s_kube-system(c77a7739-aefe-46a9-890c-f1b233600f13)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-56t4s" podUID="c77a7739-aefe-46a9-890c-f1b233600f13" May 10 00:50:31.700245 env[1773]: time="2025-05-10T00:50:31.700176179Z" level=error msg="Failed to destroy network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.700693 env[1773]: time="2025-05-10T00:50:31.700645825Z" level=error msg="encountered an error cleaning up failed sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.700803 env[1773]: time="2025-05-10T00:50:31.700718634Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d949dddc-k4hpq,Uid:197a4730-7f05-4393-bd9a-f474f7cbde84,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.701001 kubelet[2789]: E0510 00:50:31.700962 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.701095 kubelet[2789]: E0510 00:50:31.701033 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" May 10 00:50:31.701095 kubelet[2789]: E0510 00:50:31.701060 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" May 10 00:50:31.701198 kubelet[2789]: E0510 00:50:31.701117 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-68d949dddc-k4hpq_calico-system(197a4730-7f05-4393-bd9a-f474f7cbde84)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-68d949dddc-k4hpq_calico-system(197a4730-7f05-4393-bd9a-f474f7cbde84)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" podUID="197a4730-7f05-4393-bd9a-f474f7cbde84" May 10 00:50:31.705005 env[1773]: time="2025-05-10T00:50:31.704766810Z" level=error msg="Failed to destroy network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.705266 env[1773]: time="2025-05-10T00:50:31.705211479Z" level=error msg="encountered an error cleaning up failed sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.705366 env[1773]: time="2025-05-10T00:50:31.705273041Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-dv2zf,Uid:39f79222-38bb-468f-b90b-4139334f1c3a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.705586 kubelet[2789]: E0510 00:50:31.705475 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.705586 kubelet[2789]: E0510 00:50:31.705567 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" May 10 00:50:31.705766 kubelet[2789]: E0510 00:50:31.705594 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" May 10 00:50:31.705766 kubelet[2789]: E0510 00:50:31.705644 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6c4c664698-dv2zf_calico-apiserver(39f79222-38bb-468f-b90b-4139334f1c3a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6c4c664698-dv2zf_calico-apiserver(39f79222-38bb-468f-b90b-4139334f1c3a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" podUID="39f79222-38bb-468f-b90b-4139334f1c3a" May 10 00:50:31.963138 kubelet[2789]: I0510 00:50:31.961261 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:31.964172 env[1773]: time="2025-05-10T00:50:31.963906719Z" level=info msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" May 10 00:50:31.964942 kubelet[2789]: I0510 00:50:31.964918 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:31.965953 env[1773]: time="2025-05-10T00:50:31.965907388Z" level=info msg="StopPodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\"" May 10 00:50:31.968066 kubelet[2789]: I0510 00:50:31.967709 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:31.972064 env[1773]: time="2025-05-10T00:50:31.971961659Z" level=info msg="StopPodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\"" May 10 00:50:31.975865 kubelet[2789]: I0510 00:50:31.975837 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:31.979575 env[1773]: time="2025-05-10T00:50:31.979525607Z" level=info msg="StopPodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\"" May 10 00:50:31.984921 kubelet[2789]: I0510 00:50:31.982328 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:31.985361 env[1773]: time="2025-05-10T00:50:31.985324457Z" level=info msg="StopPodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\"" May 10 00:50:31.989588 kubelet[2789]: I0510 00:50:31.988620 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:31.990001 env[1773]: time="2025-05-10T00:50:31.989966437Z" level=info msg="StopPodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\"" May 10 00:50:32.119044 env[1773]: time="2025-05-10T00:50:32.118978102Z" level=error msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" failed" error="failed to destroy network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.119827 kubelet[2789]: E0510 00:50:32.119524 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:32.119827 kubelet[2789]: E0510 00:50:32.119615 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba"} May 10 00:50:32.119827 kubelet[2789]: E0510 00:50:32.119733 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"39f79222-38bb-468f-b90b-4139334f1c3a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.119827 kubelet[2789]: E0510 00:50:32.119772 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"39f79222-38bb-468f-b90b-4139334f1c3a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" podUID="39f79222-38bb-468f-b90b-4139334f1c3a" May 10 00:50:32.135138 env[1773]: time="2025-05-10T00:50:32.135073204Z" level=error msg="StopPodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" failed" error="failed to destroy network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.135356 kubelet[2789]: E0510 00:50:32.135310 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:32.135462 kubelet[2789]: E0510 00:50:32.135369 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5"} May 10 00:50:32.135462 kubelet[2789]: E0510 00:50:32.135414 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"197a4730-7f05-4393-bd9a-f474f7cbde84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.135462 kubelet[2789]: E0510 00:50:32.135445 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"197a4730-7f05-4393-bd9a-f474f7cbde84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" podUID="197a4730-7f05-4393-bd9a-f474f7cbde84" May 10 00:50:32.143907 env[1773]: time="2025-05-10T00:50:32.143832575Z" level=error msg="StopPodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" failed" error="failed to destroy network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.144136 kubelet[2789]: E0510 00:50:32.144099 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:32.144257 kubelet[2789]: E0510 00:50:32.144157 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6"} May 10 00:50:32.144257 kubelet[2789]: E0510 00:50:32.144203 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.144257 kubelet[2789]: E0510 00:50:32.144233 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" podUID="bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" May 10 00:50:32.160545 env[1773]: time="2025-05-10T00:50:32.160466044Z" level=error msg="StopPodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" failed" error="failed to destroy network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.160789 kubelet[2789]: E0510 00:50:32.160730 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:32.160884 kubelet[2789]: E0510 00:50:32.160787 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669"} May 10 00:50:32.160884 kubelet[2789]: E0510 00:50:32.160832 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ddb95e1e-8567-465e-85ac-1e86d059a924\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.160884 kubelet[2789]: E0510 00:50:32.160863 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ddb95e1e-8567-465e-85ac-1e86d059a924\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" podUID="ddb95e1e-8567-465e-85ac-1e86d059a924" May 10 00:50:32.167045 env[1773]: time="2025-05-10T00:50:32.166983195Z" level=error msg="StopPodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" failed" error="failed to destroy network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.167495 kubelet[2789]: E0510 00:50:32.167444 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:32.167632 kubelet[2789]: E0510 00:50:32.167518 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc"} May 10 00:50:32.167632 kubelet[2789]: E0510 00:50:32.167560 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"34494f4b-79ac-454b-9580-9ca26c3a43dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.167632 kubelet[2789]: E0510 00:50:32.167593 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"34494f4b-79ac-454b-9580-9ca26c3a43dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-xthsq" podUID="34494f4b-79ac-454b-9580-9ca26c3a43dc" May 10 00:50:32.224519 env[1773]: time="2025-05-10T00:50:32.223120801Z" level=error msg="StopPodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" failed" error="failed to destroy network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.224684 kubelet[2789]: E0510 00:50:32.223380 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:32.224684 kubelet[2789]: E0510 00:50:32.223432 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4"} May 10 00:50:32.224684 kubelet[2789]: E0510 00:50:32.223479 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c77a7739-aefe-46a9-890c-f1b233600f13\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.224684 kubelet[2789]: E0510 00:50:32.223536 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c77a7739-aefe-46a9-890c-f1b233600f13\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-56t4s" podUID="c77a7739-aefe-46a9-890c-f1b233600f13" May 10 00:50:32.854340 env[1773]: time="2025-05-10T00:50:32.851694705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jd8tc,Uid:249fb49c-38b8-4d34-9673-4fa848de7e21,Namespace:calico-system,Attempt:0,}" May 10 00:50:32.987727 env[1773]: time="2025-05-10T00:50:32.987659884Z" level=error msg="Failed to destroy network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.993805 env[1773]: time="2025-05-10T00:50:32.988146951Z" level=error msg="encountered an error cleaning up failed sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.993805 env[1773]: time="2025-05-10T00:50:32.988218522Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jd8tc,Uid:249fb49c-38b8-4d34-9673-4fa848de7e21,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.993944 kubelet[2789]: E0510 00:50:32.988532 2789 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.993944 kubelet[2789]: E0510 00:50:32.988614 2789 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:32.993944 kubelet[2789]: E0510 00:50:32.988641 2789 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jd8tc" May 10 00:50:32.994463 kubelet[2789]: E0510 00:50:32.988719 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jd8tc_calico-system(249fb49c-38b8-4d34-9673-4fa848de7e21)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jd8tc_calico-system(249fb49c-38b8-4d34-9673-4fa848de7e21)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:32.996572 kubelet[2789]: I0510 00:50:32.995457 2789 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:32.996245 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5-shm.mount: Deactivated successfully. May 10 00:50:32.997267 env[1773]: time="2025-05-10T00:50:32.997231545Z" level=info msg="StopPodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\"" May 10 00:50:33.069138 env[1773]: time="2025-05-10T00:50:33.069073982Z" level=error msg="StopPodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" failed" error="failed to destroy network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:33.069400 kubelet[2789]: E0510 00:50:33.069333 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:33.069527 kubelet[2789]: E0510 00:50:33.069394 2789 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5"} May 10 00:50:33.069527 kubelet[2789]: E0510 00:50:33.069437 2789 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"249fb49c-38b8-4d34-9673-4fa848de7e21\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:33.069527 kubelet[2789]: E0510 00:50:33.069473 2789 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"249fb49c-38b8-4d34-9673-4fa848de7e21\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jd8tc" podUID="249fb49c-38b8-4d34-9673-4fa848de7e21" May 10 00:50:38.897308 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3372986049.mount: Deactivated successfully. May 10 00:50:38.937141 env[1773]: time="2025-05-10T00:50:38.937086984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.940182 env[1773]: time="2025-05-10T00:50:38.940127281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.942593 env[1773]: time="2025-05-10T00:50:38.942559352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.944922 env[1773]: time="2025-05-10T00:50:38.944887155Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.945345 env[1773]: time="2025-05-10T00:50:38.945270653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:50:39.002742 env[1773]: time="2025-05-10T00:50:39.002692049Z" level=info msg="CreateContainer within sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:50:39.029023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3747675859.mount: Deactivated successfully. May 10 00:50:39.041060 env[1773]: time="2025-05-10T00:50:39.040999045Z" level=info msg="CreateContainer within sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\"" May 10 00:50:39.043123 env[1773]: time="2025-05-10T00:50:39.043092559Z" level=info msg="StartContainer for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\"" May 10 00:50:39.124988 env[1773]: time="2025-05-10T00:50:39.124929051Z" level=info msg="StartContainer for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" returns successfully" May 10 00:50:39.697857 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:50:39.698024 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:50:39.772470 systemd[1]: Started sshd@7-172.31.21.73:22-139.178.89.65:57190.service. May 10 00:50:39.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.73:22-139.178.89.65:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:39.780197 kernel: audit: type=1130 audit(1746838239.771:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.73:22-139.178.89.65:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:39.972571 sshd[4002]: Accepted publickey for core from 139.178.89.65 port 57190 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:39.981845 kernel: audit: type=1101 audit(1746838239.970:299): pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:39.970000 audit[4002]: USER_ACCT pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:39.972000 audit[4002]: CRED_ACQ pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:39.989623 kernel: audit: type=1103 audit(1746838239.972:300): pid=4002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:39.989677 kernel: audit: type=1006 audit(1746838239.972:301): pid=4002 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:50:39.990536 sshd[4002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:39.972000 audit[4002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff80ee4260 a2=3 a3=0 items=0 ppid=1 pid=4002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:40.005214 kernel: audit: type=1300 audit(1746838239.972:301): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff80ee4260 a2=3 a3=0 items=0 ppid=1 pid=4002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:40.011137 kernel: audit: type=1327 audit(1746838239.972:301): proctitle=737368643A20636F7265205B707269765D May 10 00:50:40.016357 systemd[1]: Started session-8.scope. May 10 00:50:40.018481 systemd-logind[1758]: New session 8 of user core. May 10 00:50:40.032000 audit[4002]: USER_START pid=4002 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.049796 kernel: audit: type=1105 audit(1746838240.032:302): pid=4002 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.037000 audit[4012]: CRED_ACQ pid=4012 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.060962 kernel: audit: type=1103 audit(1746838240.037:303): pid=4012 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.186679 kubelet[2789]: I0510 00:50:40.183207 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-m7q6b" podStartSLOduration=2.467491302 podStartE2EDuration="22.107284795s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:19.309068006 +0000 UTC m=+24.742396380" lastFinishedPulling="2025-05-10 00:50:38.948861486 +0000 UTC m=+44.382189873" observedRunningTime="2025-05-10 00:50:40.106824723 +0000 UTC m=+45.540153110" watchObservedRunningTime="2025-05-10 00:50:40.107284795 +0000 UTC m=+45.540613212" May 10 00:50:40.561712 sshd[4002]: pam_unix(sshd:session): session closed for user core May 10 00:50:40.571744 kernel: audit: type=1106 audit(1746838240.561:304): pid=4002 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.561000 audit[4002]: USER_END pid=4002 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.571788 systemd[1]: sshd@7-172.31.21.73:22-139.178.89.65:57190.service: Deactivated successfully. May 10 00:50:40.572767 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:50:40.561000 audit[4002]: CRED_DISP pid=4002 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.573034 systemd-logind[1758]: Session 8 logged out. Waiting for processes to exit. May 10 00:50:40.579551 systemd-logind[1758]: Removed session 8. May 10 00:50:40.580593 kernel: audit: type=1104 audit(1746838240.561:305): pid=4002 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:40.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.21.73:22-139.178.89.65:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:41.065390 kubelet[2789]: I0510 00:50:41.065337 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:41.260000 audit[4097]: AVC avc: denied { write } for pid=4097 comm="tee" name="fd" dev="proc" ino=24484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.262000 audit[4093]: AVC avc: denied { write } for pid=4093 comm="tee" name="fd" dev="proc" ino=24487 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.272000 audit[4080]: AVC avc: denied { write } for pid=4080 comm="tee" name="fd" dev="proc" ino=25460 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.272000 audit[4080]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaeadaa1a a2=241 a3=1b6 items=1 ppid=4041 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.272000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:50:41.272000 audit: PATH item=0 name="/dev/fd/63" inode=25448 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.260000 audit[4097]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff35f6ea1b a2=241 a3=1b6 items=1 ppid=4051 pid=4097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.260000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:50:41.260000 audit: PATH item=0 name="/dev/fd/63" inode=24479 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.260000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.262000 audit[4093]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc28183a1c a2=241 a3=1b6 items=1 ppid=4045 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.262000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:50:41.262000 audit: PATH item=0 name="/dev/fd/63" inode=25452 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.262000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.290000 audit[4083]: AVC avc: denied { write } for pid=4083 comm="tee" name="fd" dev="proc" ino=25465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.290000 audit[4083]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2a207a1a a2=241 a3=1b6 items=1 ppid=4053 pid=4083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.295000 audit[4098]: AVC avc: denied { write } for pid=4098 comm="tee" name="fd" dev="proc" ino=25471 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.290000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:50:41.290000 audit: PATH item=0 name="/dev/fd/63" inode=25451 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.290000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.295000 audit[4098]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea0a60a0b a2=241 a3=1b6 items=1 ppid=4048 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.295000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:50:41.295000 audit: PATH item=0 name="/dev/fd/63" inode=25453 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.295000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.304000 audit[4106]: AVC avc: denied { write } for pid=4106 comm="tee" name="fd" dev="proc" ino=25477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.304000 audit[4106]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec2ae6a0a a2=241 a3=1b6 items=1 ppid=4044 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.304000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:50:41.304000 audit: PATH item=0 name="/dev/fd/63" inode=25457 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.304000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.319000 audit[4115]: AVC avc: denied { write } for pid=4115 comm="tee" name="fd" dev="proc" ino=25481 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.319000 audit[4115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaac0ca1a a2=241 a3=1b6 items=1 ppid=4043 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.319000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:50:41.319000 audit: PATH item=0 name="/dev/fd/63" inode=25473 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.319000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.651000 audit: BPF prog-id=10 op=LOAD May 10 00:50:41.651000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea91c5b40 a2=98 a3=3 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.651000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.651000 audit: BPF prog-id=10 op=UNLOAD May 10 00:50:41.652000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.652000 audit: BPF prog-id=11 op=LOAD May 10 00:50:41.652000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea91c5920 a2=74 a3=540051 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.652000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.653000 audit: BPF prog-id=11 op=UNLOAD May 10 00:50:41.653000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.653000 audit: BPF prog-id=12 op=LOAD May 10 00:50:41.653000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea91c5950 a2=94 a3=2 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.653000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.653000 audit: BPF prog-id=12 op=UNLOAD May 10 00:50:41.764000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit: BPF prog-id=13 op=LOAD May 10 00:50:41.764000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffea91c5810 a2=40 a3=1 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.764000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.764000 audit: BPF prog-id=13 op=UNLOAD May 10 00:50:41.764000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.764000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffea91c58e0 a2=50 a3=7ffea91c59c0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.764000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91c5820 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91c5850 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91c5760 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91c5870 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91c5850 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91c5840 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91c5870 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91c5850 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91c5870 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffea91c5840 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffea91c58b0 a2=28 a3=0 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea91c5660 a2=50 a3=1 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit: BPF prog-id=14 op=LOAD May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffea91c5660 a2=94 a3=5 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit: BPF prog-id=14 op=UNLOAD May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffea91c5710 a2=50 a3=1 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffea91c5830 a2=4 a3=38 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.775000 audit[4154]: AVC avc: denied { confidentiality } for pid=4154 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.775000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea91c5880 a2=94 a3=6 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { confidentiality } for pid=4154 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.776000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea91c5030 a2=94 a3=83 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.776000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.776000 audit[4154]: AVC avc: denied { confidentiality } for pid=4154 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.776000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffea91c5030 a2=94 a3=83 items=0 ppid=4056 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.776000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit: BPF prog-id=15 op=LOAD May 10 00:50:41.788000 audit[4157]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcca0d33e0 a2=98 a3=1999999999999999 items=0 ppid=4056 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.788000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:41.788000 audit: BPF prog-id=15 op=UNLOAD May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit: BPF prog-id=16 op=LOAD May 10 00:50:41.788000 audit[4157]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcca0d32c0 a2=74 a3=ffff items=0 ppid=4056 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.788000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:41.788000 audit: BPF prog-id=16 op=UNLOAD May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { perfmon } for pid=4157 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit[4157]: AVC avc: denied { bpf } for pid=4157 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.788000 audit: BPF prog-id=17 op=LOAD May 10 00:50:41.788000 audit[4157]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcca0d3300 a2=40 a3=7ffcca0d34e0 items=0 ppid=4056 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.788000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:41.788000 audit: BPF prog-id=17 op=UNLOAD May 10 00:50:41.884544 systemd[1]: run-containerd-runc-k8s.io-af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334-runc.5ULADP.mount: Deactivated successfully. May 10 00:50:41.896625 (udev-worker)[3996]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:41.900582 systemd-networkd[1435]: vxlan.calico: Link UP May 10 00:50:41.900593 systemd-networkd[1435]: vxlan.calico: Gained carrier May 10 00:50:41.937954 (udev-worker)[3995]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:41.942170 (udev-worker)[4202]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit: BPF prog-id=18 op=LOAD May 10 00:50:41.944000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff46179520 a2=98 a3=ffffffff items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.944000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.944000 audit: BPF prog-id=18 op=UNLOAD May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.944000 audit: BPF prog-id=19 op=LOAD May 10 00:50:41.944000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff46179330 a2=74 a3=540051 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.944000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit: BPF prog-id=19 op=UNLOAD May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit: BPF prog-id=20 op=LOAD May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff46179360 a2=94 a3=2 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit: BPF prog-id=20 op=UNLOAD May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46179230 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46179260 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46179170 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46179280 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46179260 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46179250 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff46179280 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46179260 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46179280 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff46179250 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff461792c0 a2=28 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.945000 audit: BPF prog-id=21 op=LOAD May 10 00:50:41.945000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46179130 a2=40 a3=0 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.945000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.945000 audit: BPF prog-id=21 op=UNLOAD May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff46179120 a2=50 a3=2800 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff46179120 a2=50 a3=2800 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit: BPF prog-id=22 op=LOAD May 10 00:50:41.946000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46178940 a2=94 a3=2 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.946000 audit: BPF prog-id=22 op=UNLOAD May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.946000 audit: BPF prog-id=23 op=LOAD May 10 00:50:41.946000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff46178a40 a2=94 a3=30 items=0 ppid=4056 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.946000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.953000 audit: BPF prog-id=24 op=LOAD May 10 00:50:41.953000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffa8def40 a2=98 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.953000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.961000 audit: BPF prog-id=24 op=UNLOAD May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit: BPF prog-id=25 op=LOAD May 10 00:50:41.961000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffa8ded20 a2=74 a3=540051 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.961000 audit: BPF prog-id=25 op=UNLOAD May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.961000 audit: BPF prog-id=26 op=LOAD May 10 00:50:41.961000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffa8ded50 a2=94 a3=2 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.961000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.961000 audit: BPF prog-id=26 op=UNLOAD May 10 00:50:42.163847 systemd[1]: run-containerd-runc-k8s.io-af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334-runc.8tYhn4.mount: Deactivated successfully. May 10 00:50:42.210000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.210000 audit: BPF prog-id=27 op=LOAD May 10 00:50:42.210000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffa8dec10 a2=40 a3=1 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.210000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.211000 audit: BPF prog-id=27 op=UNLOAD May 10 00:50:42.211000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.211000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffffa8dece0 a2=50 a3=7ffffa8dedc0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.211000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.230000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.230000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffa8dec20 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.230000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.230000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.230000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffa8dec50 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.230000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.231000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.231000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffa8deb60 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.231000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.231000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.231000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffa8dec70 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.231000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.231000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.231000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffa8dec50 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.231000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.231000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.231000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffa8dec40 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.231000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.232000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.232000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffa8dec70 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.232000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.232000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.232000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffa8dec50 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.232000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.232000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.232000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffa8dec70 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.232000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.232000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.232000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffa8dec40 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.232000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffa8decb0 a2=28 a3=0 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffa8dea60 a2=50 a3=1 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.233000 audit: BPF prog-id=28 op=LOAD May 10 00:50:42.233000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffffa8dea60 a2=94 a3=5 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.233000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.234000 audit: BPF prog-id=28 op=UNLOAD May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffa8deb10 a2=50 a3=1 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffffa8dec30 a2=4 a3=38 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.234000 audit[4207]: AVC avc: denied { confidentiality } for pid=4207 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:42.234000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffa8dec80 a2=94 a3=6 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { confidentiality } for pid=4207 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:42.241000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffa8de430 a2=94 a3=83 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.241000 audit[4207]: AVC avc: denied { confidentiality } for pid=4207 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:42.241000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffa8de430 a2=94 a3=83 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.241000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.243000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.243000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffa8dfe70 a2=10 a3=f1f00800 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.243000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.244000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.244000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffa8dfd10 a2=10 a3=3 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.244000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.244000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffa8dfcb0 a2=10 a3=3 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.244000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:42.244000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffa8dfcb0 a2=10 a3=7 items=0 ppid=4056 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:42.253000 audit: BPF prog-id=23 op=UNLOAD May 10 00:50:42.327000 audit[4276]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4276 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:42.327000 audit[4276]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffcf3f1a60 a2=0 a3=7fffcf3f1a4c items=0 ppid=4056 pid=4276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:42.342000 audit[4275]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4275 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:42.342000 audit[4275]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe6ca53980 a2=0 a3=7ffe6ca5396c items=0 ppid=4056 pid=4275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.342000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:42.347000 audit[4278]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=4278 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:42.347000 audit[4278]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe3eed8260 a2=0 a3=7ffe3eed824c items=0 ppid=4056 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.347000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:42.349000 audit[4274]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:42.349000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdcfce3a80 a2=0 a3=7ffdcfce3a6c items=0 ppid=4056 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.349000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:42.849105 env[1773]: time="2025-05-10T00:50:42.849007692Z" level=info msg="StopPodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\"" May 10 00:50:43.037751 systemd-networkd[1435]: vxlan.calico: Gained IPv6LL May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:42.944 [INFO][4300] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:42.946 [INFO][4300] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" iface="eth0" netns="/var/run/netns/cni-06e4e82e-5582-e097-c8b9-ba9eebe56e1d" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:42.946 [INFO][4300] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" iface="eth0" netns="/var/run/netns/cni-06e4e82e-5582-e097-c8b9-ba9eebe56e1d" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:42.949 [INFO][4300] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" iface="eth0" netns="/var/run/netns/cni-06e4e82e-5582-e097-c8b9-ba9eebe56e1d" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:42.949 [INFO][4300] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:42.949 [INFO][4300] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.247 [INFO][4307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.250 [INFO][4307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.252 [INFO][4307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.267 [WARNING][4307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.267 [INFO][4307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.269 [INFO][4307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:43.274740 env[1773]: 2025-05-10 00:50:43.271 [INFO][4300] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:43.279008 env[1773]: time="2025-05-10T00:50:43.278951614Z" level=info msg="TearDown network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" successfully" May 10 00:50:43.279219 env[1773]: time="2025-05-10T00:50:43.279190378Z" level=info msg="StopPodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" returns successfully" May 10 00:50:43.280602 systemd[1]: run-netns-cni\x2d06e4e82e\x2d5582\x2de097\x2dc8b9\x2dba9eebe56e1d.mount: Deactivated successfully. May 10 00:50:43.284689 env[1773]: time="2025-05-10T00:50:43.284650660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b9fb45589-d24jc,Uid:ddb95e1e-8567-465e-85ac-1e86d059a924,Namespace:calico-apiserver,Attempt:1,}" May 10 00:50:43.464563 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:43.468185 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f83015a277: link becomes ready May 10 00:50:43.467261 systemd-networkd[1435]: cali7f83015a277: Link UP May 10 00:50:43.467457 systemd-networkd[1435]: cali7f83015a277: Gained carrier May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.354 [INFO][4315] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0 calico-apiserver-7b9fb45589- calico-apiserver ddb95e1e-8567-465e-85ac-1e86d059a924 814 0 2025-05-10 00:50:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b9fb45589 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-21-73 calico-apiserver-7b9fb45589-d24jc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7f83015a277 [] []}} ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.355 [INFO][4315] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.403 [INFO][4329] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" HandleID="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.414 [INFO][4329] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" HandleID="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002659b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-73", "pod":"calico-apiserver-7b9fb45589-d24jc", "timestamp":"2025-05-10 00:50:43.403738634 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.414 [INFO][4329] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.415 [INFO][4329] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.415 [INFO][4329] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.418 [INFO][4329] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.427 [INFO][4329] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.433 [INFO][4329] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.435 [INFO][4329] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.438 [INFO][4329] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.438 [INFO][4329] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.439 [INFO][4329] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3 May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.446 [INFO][4329] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.453 [INFO][4329] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.193/26] block=192.168.51.192/26 handle="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.453 [INFO][4329] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.193/26] handle="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" host="ip-172-31-21-73" May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.453 [INFO][4329] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:43.486152 env[1773]: 2025-05-10 00:50:43.453 [INFO][4329] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.193/26] IPv6=[] ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" HandleID="k8s-pod-network.26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.486848 env[1773]: 2025-05-10 00:50:43.457 [INFO][4315] cni-plugin/k8s.go 386: Populated endpoint ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0", GenerateName:"calico-apiserver-7b9fb45589-", Namespace:"calico-apiserver", SelfLink:"", UID:"ddb95e1e-8567-465e-85ac-1e86d059a924", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b9fb45589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"calico-apiserver-7b9fb45589-d24jc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f83015a277", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:43.486848 env[1773]: 2025-05-10 00:50:43.457 [INFO][4315] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.193/32] ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.486848 env[1773]: 2025-05-10 00:50:43.457 [INFO][4315] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7f83015a277 ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.486848 env[1773]: 2025-05-10 00:50:43.464 [INFO][4315] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.486848 env[1773]: 2025-05-10 00:50:43.465 [INFO][4315] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0", GenerateName:"calico-apiserver-7b9fb45589-", Namespace:"calico-apiserver", SelfLink:"", UID:"ddb95e1e-8567-465e-85ac-1e86d059a924", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b9fb45589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3", Pod:"calico-apiserver-7b9fb45589-d24jc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f83015a277", MAC:"e2:db:7a:e8:0c:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:43.486848 env[1773]: 2025-05-10 00:50:43.483 [INFO][4315] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3" Namespace="calico-apiserver" Pod="calico-apiserver-7b9fb45589-d24jc" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:43.494000 audit[4344]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4344 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:43.494000 audit[4344]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffede8dedd0 a2=0 a3=7ffede8dedbc items=0 ppid=4056 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:43.494000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:43.506845 env[1773]: time="2025-05-10T00:50:43.506741103Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:43.506845 env[1773]: time="2025-05-10T00:50:43.506789482Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:43.506845 env[1773]: time="2025-05-10T00:50:43.506800583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:43.507150 env[1773]: time="2025-05-10T00:50:43.507107579Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3 pid=4356 runtime=io.containerd.runc.v2 May 10 00:50:43.573369 env[1773]: time="2025-05-10T00:50:43.573322882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b9fb45589-d24jc,Uid:ddb95e1e-8567-465e-85ac-1e86d059a924,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3\"" May 10 00:50:43.577271 env[1773]: time="2025-05-10T00:50:43.577234015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:50:44.852306 env[1773]: time="2025-05-10T00:50:44.852262878Z" level=info msg="StopPodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\"" May 10 00:50:44.852980 env[1773]: time="2025-05-10T00:50:44.852283134Z" level=info msg="StopPodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\"" May 10 00:50:44.893803 systemd-networkd[1435]: cali7f83015a277: Gained IPv6LL May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:44.947 [INFO][4424] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:44.947 [INFO][4424] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" iface="eth0" netns="/var/run/netns/cni-4a3f1fb0-1d19-f019-44e9-ebc5e670391c" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:44.948 [INFO][4424] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" iface="eth0" netns="/var/run/netns/cni-4a3f1fb0-1d19-f019-44e9-ebc5e670391c" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:44.948 [INFO][4424] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" iface="eth0" netns="/var/run/netns/cni-4a3f1fb0-1d19-f019-44e9-ebc5e670391c" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:44.948 [INFO][4424] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:44.948 [INFO][4424] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.042 [INFO][4435] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.043 [INFO][4435] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.043 [INFO][4435] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.058 [WARNING][4435] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.058 [INFO][4435] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.060 [INFO][4435] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:45.068052 env[1773]: 2025-05-10 00:50:45.065 [INFO][4424] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:45.078847 systemd[1]: run-netns-cni\x2d4a3f1fb0\x2d1d19\x2df019\x2d44e9\x2debc5e670391c.mount: Deactivated successfully. May 10 00:50:45.080777 env[1773]: time="2025-05-10T00:50:45.080733364Z" level=info msg="TearDown network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" successfully" May 10 00:50:45.080885 env[1773]: time="2025-05-10T00:50:45.080866914Z" level=info msg="StopPodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" returns successfully" May 10 00:50:45.082272 env[1773]: time="2025-05-10T00:50:45.082223351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xthsq,Uid:34494f4b-79ac-454b-9580-9ca26c3a43dc,Namespace:kube-system,Attempt:1,}" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:44.996 [INFO][4425] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:44.996 [INFO][4425] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" iface="eth0" netns="/var/run/netns/cni-06f51274-6322-4155-5cb3-729e6bdf18e4" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:44.996 [INFO][4425] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" iface="eth0" netns="/var/run/netns/cni-06f51274-6322-4155-5cb3-729e6bdf18e4" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:44.996 [INFO][4425] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" iface="eth0" netns="/var/run/netns/cni-06f51274-6322-4155-5cb3-729e6bdf18e4" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:44.996 [INFO][4425] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:44.996 [INFO][4425] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.091 [INFO][4444] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.093 [INFO][4444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.093 [INFO][4444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.118 [WARNING][4444] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.118 [INFO][4444] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.120 [INFO][4444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:45.162108 env[1773]: 2025-05-10 00:50:45.123 [INFO][4425] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:45.170294 systemd[1]: run-netns-cni\x2d06f51274\x2d6322\x2d4155\x2d5cb3\x2d729e6bdf18e4.mount: Deactivated successfully. May 10 00:50:45.174798 env[1773]: time="2025-05-10T00:50:45.174729310Z" level=info msg="TearDown network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" successfully" May 10 00:50:45.174977 env[1773]: time="2025-05-10T00:50:45.174953918Z" level=info msg="StopPodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" returns successfully" May 10 00:50:45.175982 env[1773]: time="2025-05-10T00:50:45.175948969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-56t4s,Uid:c77a7739-aefe-46a9-890c-f1b233600f13,Namespace:kube-system,Attempt:1,}" May 10 00:50:45.405211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:45.405569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5753cb02631: link becomes ready May 10 00:50:45.405588 systemd-networkd[1435]: cali5753cb02631: Link UP May 10 00:50:45.406197 systemd-networkd[1435]: cali5753cb02631: Gained carrier May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.229 [INFO][4453] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0 coredns-7db6d8ff4d- kube-system 34494f4b-79ac-454b-9580-9ca26c3a43dc 832 0 2025-05-10 00:50:07 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-73 coredns-7db6d8ff4d-xthsq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5753cb02631 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.229 [INFO][4453] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.309 [INFO][4466] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" HandleID="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.343 [INFO][4466] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" HandleID="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b0750), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-73", "pod":"coredns-7db6d8ff4d-xthsq", "timestamp":"2025-05-10 00:50:45.309547664 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.343 [INFO][4466] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.343 [INFO][4466] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.343 [INFO][4466] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.345 [INFO][4466] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.350 [INFO][4466] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.356 [INFO][4466] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.361 [INFO][4466] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.364 [INFO][4466] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.365 [INFO][4466] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.369 [INFO][4466] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21 May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.377 [INFO][4466] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.389 [INFO][4466] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.194/26] block=192.168.51.192/26 handle="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.390 [INFO][4466] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.194/26] handle="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" host="ip-172-31-21-73" May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.390 [INFO][4466] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:45.429366 env[1773]: 2025-05-10 00:50:45.390 [INFO][4466] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.194/26] IPv6=[] ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" HandleID="k8s-pod-network.ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.432234 env[1773]: 2025-05-10 00:50:45.392 [INFO][4453] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34494f4b-79ac-454b-9580-9ca26c3a43dc", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"coredns-7db6d8ff4d-xthsq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5753cb02631", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:45.432234 env[1773]: 2025-05-10 00:50:45.392 [INFO][4453] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.194/32] ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.432234 env[1773]: 2025-05-10 00:50:45.393 [INFO][4453] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5753cb02631 ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.432234 env[1773]: 2025-05-10 00:50:45.406 [INFO][4453] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.432234 env[1773]: 2025-05-10 00:50:45.407 [INFO][4453] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34494f4b-79ac-454b-9580-9ca26c3a43dc", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21", Pod:"coredns-7db6d8ff4d-xthsq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5753cb02631", MAC:"a2:cb:79:2c:6e:2a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:45.432234 env[1773]: 2025-05-10 00:50:45.424 [INFO][4453] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21" Namespace="kube-system" Pod="coredns-7db6d8ff4d-xthsq" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:45.450000 audit[4500]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:45.452937 kernel: kauditd_printk_skb: 519 callbacks suppressed May 10 00:50:45.453036 kernel: audit: type=1325 audit(1746838245.450:410): table=filter:102 family=2 entries=38 op=nft_register_chain pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:45.450000 audit[4500]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc15f271e0 a2=0 a3=7ffc15f271cc items=0 ppid=4056 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.455836 kernel: audit: type=1300 audit(1746838245.450:410): arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc15f271e0 a2=0 a3=7ffc15f271cc items=0 ppid=4056 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.450000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:45.467566 kernel: audit: type=1327 audit(1746838245.450:410): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:45.484426 env[1773]: time="2025-05-10T00:50:45.484348886Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:45.484705 env[1773]: time="2025-05-10T00:50:45.484398216Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:45.484705 env[1773]: time="2025-05-10T00:50:45.484413732Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:45.484705 env[1773]: time="2025-05-10T00:50:45.484610419Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21 pid=4513 runtime=io.containerd.runc.v2 May 10 00:50:45.558713 systemd-networkd[1435]: calid29a21f6985: Link UP May 10 00:50:45.560023 systemd-networkd[1435]: calid29a21f6985: Gained carrier May 10 00:50:45.560612 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid29a21f6985: link becomes ready May 10 00:50:45.594525 kernel: audit: type=1130 audit(1746838245.587:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.73:22-139.178.89.65:57204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:45.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.73:22-139.178.89.65:57204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:45.589140 systemd[1]: Started sshd@8-172.31.21.73:22-139.178.89.65:57204.service. May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.337 [INFO][4471] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0 coredns-7db6d8ff4d- kube-system c77a7739-aefe-46a9-890c-f1b233600f13 833 0 2025-05-10 00:50:07 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-21-73 coredns-7db6d8ff4d-56t4s eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid29a21f6985 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.337 [INFO][4471] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.473 [INFO][4487] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" HandleID="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.492 [INFO][4487] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" HandleID="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000285130), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-21-73", "pod":"coredns-7db6d8ff4d-56t4s", "timestamp":"2025-05-10 00:50:45.473816906 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.492 [INFO][4487] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.493 [INFO][4487] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.493 [INFO][4487] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.495 [INFO][4487] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.500 [INFO][4487] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.506 [INFO][4487] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.508 [INFO][4487] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.512 [INFO][4487] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.512 [INFO][4487] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.524 [INFO][4487] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.530 [INFO][4487] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.545 [INFO][4487] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.195/26] block=192.168.51.192/26 handle="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.545 [INFO][4487] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.195/26] handle="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" host="ip-172-31-21-73" May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.545 [INFO][4487] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:45.603345 env[1773]: 2025-05-10 00:50:45.545 [INFO][4487] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.195/26] IPv6=[] ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" HandleID="k8s-pod-network.2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.606284 env[1773]: 2025-05-10 00:50:45.548 [INFO][4471] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c77a7739-aefe-46a9-890c-f1b233600f13", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"coredns-7db6d8ff4d-56t4s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid29a21f6985", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:45.606284 env[1773]: 2025-05-10 00:50:45.548 [INFO][4471] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.195/32] ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.606284 env[1773]: 2025-05-10 00:50:45.548 [INFO][4471] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid29a21f6985 ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.606284 env[1773]: 2025-05-10 00:50:45.561 [INFO][4471] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.606284 env[1773]: 2025-05-10 00:50:45.563 [INFO][4471] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c77a7739-aefe-46a9-890c-f1b233600f13", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a", Pod:"coredns-7db6d8ff4d-56t4s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid29a21f6985", MAC:"0a:ec:b2:2c:0c:3d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:45.606284 env[1773]: 2025-05-10 00:50:45.598 [INFO][4471] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a" Namespace="kube-system" Pod="coredns-7db6d8ff4d-56t4s" WorkloadEndpoint="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:45.611000 audit[4546]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:45.611000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff9be02490 a2=0 a3=7fff9be0247c items=0 ppid=4056 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.621240 kernel: audit: type=1325 audit(1746838245.611:412): table=filter:103 family=2 entries=34 op=nft_register_chain pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:45.621341 kernel: audit: type=1300 audit(1746838245.611:412): arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7fff9be02490 a2=0 a3=7fff9be0247c items=0 ppid=4056 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.622257 kernel: audit: type=1327 audit(1746838245.611:412): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:45.611000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:45.666541 env[1773]: time="2025-05-10T00:50:45.666471354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-xthsq,Uid:34494f4b-79ac-454b-9580-9ca26c3a43dc,Namespace:kube-system,Attempt:1,} returns sandbox id \"ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21\"" May 10 00:50:45.672629 env[1773]: time="2025-05-10T00:50:45.672566661Z" level=info msg="CreateContainer within sandbox \"ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:50:45.696349 env[1773]: time="2025-05-10T00:50:45.694731002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:45.696349 env[1773]: time="2025-05-10T00:50:45.694811681Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:45.696349 env[1773]: time="2025-05-10T00:50:45.694827487Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:45.696349 env[1773]: time="2025-05-10T00:50:45.695035176Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a pid=4569 runtime=io.containerd.runc.v2 May 10 00:50:45.702589 env[1773]: time="2025-05-10T00:50:45.702527535Z" level=info msg="CreateContainer within sandbox \"ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5a9fd5531248ef8227c8f2bcc64a7f9e8f46b65595e6737b41cd8673ff6fde4e\"" May 10 00:50:45.703644 env[1773]: time="2025-05-10T00:50:45.703613986Z" level=info msg="StartContainer for \"5a9fd5531248ef8227c8f2bcc64a7f9e8f46b65595e6737b41cd8673ff6fde4e\"" May 10 00:50:45.819000 audit[4544]: USER_ACCT pid=4544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:45.827804 kernel: audit: type=1101 audit(1746838245.819:413): pid=4544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:45.828000 audit[4544]: CRED_ACQ pid=4544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:45.839358 sshd[4544]: Accepted publickey for core from 139.178.89.65 port 57204 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:45.839763 kernel: audit: type=1103 audit(1746838245.828:414): pid=4544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:45.844528 sshd[4544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:45.851358 kernel: audit: type=1006 audit(1746838245.838:415): pid=4544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:50:45.851534 env[1773]: time="2025-05-10T00:50:45.846873266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-56t4s,Uid:c77a7739-aefe-46a9-890c-f1b233600f13,Namespace:kube-system,Attempt:1,} returns sandbox id \"2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a\"" May 10 00:50:45.838000 audit[4544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaca7e220 a2=3 a3=0 items=0 ppid=1 pid=4544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.838000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:45.855218 env[1773]: time="2025-05-10T00:50:45.855029159Z" level=info msg="StopPodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\"" May 10 00:50:45.859766 systemd[1]: Started session-9.scope. May 10 00:50:45.860378 systemd-logind[1758]: New session 9 of user core. May 10 00:50:45.876000 audit[4544]: USER_START pid=4544 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:45.878000 audit[4634]: CRED_ACQ pid=4634 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:45.903310 env[1773]: time="2025-05-10T00:50:45.903274899Z" level=info msg="CreateContainer within sandbox \"2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:50:45.903699 env[1773]: time="2025-05-10T00:50:45.903671012Z" level=info msg="StartContainer for \"5a9fd5531248ef8227c8f2bcc64a7f9e8f46b65595e6737b41cd8673ff6fde4e\" returns successfully" May 10 00:50:45.930725 env[1773]: time="2025-05-10T00:50:45.930676342Z" level=info msg="CreateContainer within sandbox \"2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"13e2e69abd80e89d9a84d69891c418e5526e87fae49cbd19f60aeedd62c4a3b1\"" May 10 00:50:45.933920 env[1773]: time="2025-05-10T00:50:45.933892037Z" level=info msg="StartContainer for \"13e2e69abd80e89d9a84d69891c418e5526e87fae49cbd19f60aeedd62c4a3b1\"" May 10 00:50:46.219129 env[1773]: time="2025-05-10T00:50:46.219066974Z" level=info msg="StartContainer for \"13e2e69abd80e89d9a84d69891c418e5526e87fae49cbd19f60aeedd62c4a3b1\" returns successfully" May 10 00:50:46.251000 audit[4710]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:46.251000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd3e4e7e40 a2=0 a3=7ffd3e4e7e2c items=0 ppid=3020 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:46.255000 audit[4710]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:46.255000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd3e4e7e40 a2=0 a3=0 items=0 ppid=3020 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.047 [INFO][4653] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.047 [INFO][4653] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" iface="eth0" netns="/var/run/netns/cni-98a0039e-d72b-37e4-412d-0c4674166cd9" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.047 [INFO][4653] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" iface="eth0" netns="/var/run/netns/cni-98a0039e-d72b-37e4-412d-0c4674166cd9" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.047 [INFO][4653] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" iface="eth0" netns="/var/run/netns/cni-98a0039e-d72b-37e4-412d-0c4674166cd9" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.047 [INFO][4653] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.047 [INFO][4653] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.295 [INFO][4682] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.296 [INFO][4682] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.296 [INFO][4682] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.306 [WARNING][4682] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.306 [INFO][4682] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.311 [INFO][4682] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:46.321459 env[1773]: 2025-05-10 00:50:46.317 [INFO][4653] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:46.333279 systemd[1]: run-netns-cni\x2d98a0039e\x2dd72b\x2d37e4\x2d412d\x2d0c4674166cd9.mount: Deactivated successfully. May 10 00:50:46.339137 env[1773]: time="2025-05-10T00:50:46.337301854Z" level=info msg="TearDown network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" successfully" May 10 00:50:46.339299 env[1773]: time="2025-05-10T00:50:46.339276198Z" level=info msg="StopPodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" returns successfully" May 10 00:50:46.342195 env[1773]: time="2025-05-10T00:50:46.342134545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-srrfv,Uid:bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0,Namespace:calico-apiserver,Attempt:1,}" May 10 00:50:46.674148 sshd[4544]: pam_unix(sshd:session): session closed for user core May 10 00:50:46.674000 audit[4544]: USER_END pid=4544 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:46.674000 audit[4544]: CRED_DISP pid=4544 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:46.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.21.73:22-139.178.89.65:57204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:46.677726 systemd[1]: sshd@8-172.31.21.73:22-139.178.89.65:57204.service: Deactivated successfully. May 10 00:50:46.678827 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:50:46.682189 systemd-logind[1758]: Session 9 logged out. Waiting for processes to exit. May 10 00:50:46.684156 systemd-logind[1758]: Removed session 9. May 10 00:50:46.736157 systemd-networkd[1435]: cali0e3cb83e7f6: Link UP May 10 00:50:46.743531 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:46.744095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0e3cb83e7f6: link becomes ready May 10 00:50:46.743809 systemd-networkd[1435]: cali0e3cb83e7f6: Gained carrier May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.538 [INFO][4716] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0 calico-apiserver-6c4c664698- calico-apiserver bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0 852 0 2025-05-10 00:50:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6c4c664698 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-21-73 calico-apiserver-6c4c664698-srrfv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0e3cb83e7f6 [] []}} ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.539 [INFO][4716] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.655 [INFO][4730] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.685 [INFO][4730] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000224f60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-73", "pod":"calico-apiserver-6c4c664698-srrfv", "timestamp":"2025-05-10 00:50:46.654751057 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.685 [INFO][4730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.685 [INFO][4730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.685 [INFO][4730] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.688 [INFO][4730] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.693 [INFO][4730] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.698 [INFO][4730] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.700 [INFO][4730] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.703 [INFO][4730] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.703 [INFO][4730] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.705 [INFO][4730] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5 May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.711 [INFO][4730] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.724 [INFO][4730] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.196/26] block=192.168.51.192/26 handle="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.724 [INFO][4730] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.196/26] handle="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" host="ip-172-31-21-73" May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.724 [INFO][4730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:46.773571 env[1773]: 2025-05-10 00:50:46.724 [INFO][4730] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.196/26] IPv6=[] ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.774707 env[1773]: 2025-05-10 00:50:46.726 [INFO][4716] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"calico-apiserver-6c4c664698-srrfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e3cb83e7f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:46.774707 env[1773]: 2025-05-10 00:50:46.726 [INFO][4716] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.196/32] ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.774707 env[1773]: 2025-05-10 00:50:46.726 [INFO][4716] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0e3cb83e7f6 ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.774707 env[1773]: 2025-05-10 00:50:46.743 [INFO][4716] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.774707 env[1773]: 2025-05-10 00:50:46.747 [INFO][4716] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5", Pod:"calico-apiserver-6c4c664698-srrfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e3cb83e7f6", MAC:"4e:a3:7e:e9:37:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:46.774707 env[1773]: 2025-05-10 00:50:46.764 [INFO][4716] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-srrfv" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:46.790780 kubelet[2789]: I0510 00:50:46.790711 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-xthsq" podStartSLOduration=39.790661775 podStartE2EDuration="39.790661775s" podCreationTimestamp="2025-05-10 00:50:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:46.155819503 +0000 UTC m=+51.589147883" watchObservedRunningTime="2025-05-10 00:50:46.790661775 +0000 UTC m=+52.223990163" May 10 00:50:46.815000 audit[4751]: NETFILTER_CFG table=filter:106 family=2 entries=42 op=nft_register_chain pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:46.815000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=22704 a0=3 a1=7ffe88fbf140 a2=0 a3=7ffe88fbf12c items=0 ppid=4056 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:46.837782 env[1773]: time="2025-05-10T00:50:46.834731498Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:46.837782 env[1773]: time="2025-05-10T00:50:46.834788245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:46.837782 env[1773]: time="2025-05-10T00:50:46.834804804Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:46.837782 env[1773]: time="2025-05-10T00:50:46.835013886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5 pid=4761 runtime=io.containerd.runc.v2 May 10 00:50:46.851625 env[1773]: time="2025-05-10T00:50:46.851541795Z" level=info msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" May 10 00:50:46.859260 env[1773]: time="2025-05-10T00:50:46.859213236Z" level=info msg="StopPodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\"" May 10 00:50:46.860263 env[1773]: time="2025-05-10T00:50:46.859662511Z" level=info msg="StopPodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\"" May 10 00:50:46.880279 systemd-networkd[1435]: cali5753cb02631: Gained IPv6LL May 10 00:50:47.151281 env[1773]: time="2025-05-10T00:50:47.151235517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-srrfv,Uid:bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\"" May 10 00:50:47.192623 kubelet[2789]: I0510 00:50:47.191722 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-56t4s" podStartSLOduration=40.191700176 podStartE2EDuration="40.191700176s" podCreationTimestamp="2025-05-10 00:50:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:47.16089138 +0000 UTC m=+52.594219767" watchObservedRunningTime="2025-05-10 00:50:47.191700176 +0000 UTC m=+52.625028567" May 10 00:50:47.240000 audit[4869]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.240000 audit[4869]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdec709cd0 a2=0 a3=7ffdec709cbc items=0 ppid=3020 pid=4869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.244000 audit[4869]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.244000 audit[4869]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdec709cd0 a2=0 a3=0 items=0 ppid=3020 pid=4869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.290000 audit[4877]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.290000 audit[4877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd0d354a50 a2=0 a3=7ffd0d354a3c items=0 ppid=3020 pid=4877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.109 [INFO][4821] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.113 [INFO][4821] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" iface="eth0" netns="/var/run/netns/cni-6cd0984e-0458-6a3a-6e76-4f2fa5846286" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.113 [INFO][4821] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" iface="eth0" netns="/var/run/netns/cni-6cd0984e-0458-6a3a-6e76-4f2fa5846286" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.113 [INFO][4821] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" iface="eth0" netns="/var/run/netns/cni-6cd0984e-0458-6a3a-6e76-4f2fa5846286" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.113 [INFO][4821] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.113 [INFO][4821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.303 [INFO][4863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.303 [INFO][4863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.304 [INFO][4863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.311 [WARNING][4863] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.312 [INFO][4863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.314 [INFO][4863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.320460 env[1773]: 2025-05-10 00:50:47.318 [INFO][4821] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:47.320000 audit[4877]: NETFILTER_CFG table=nat:110 family=2 entries=47 op=nft_register_chain pid=4877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.320000 audit[4877]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd0d354a50 a2=0 a3=7ffd0d354a3c items=0 ppid=3020 pid=4877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.326640 systemd[1]: run-netns-cni\x2d6cd0984e\x2d0458\x2d6a3a\x2d6e76\x2d4f2fa5846286.mount: Deactivated successfully. May 10 00:50:47.328210 env[1773]: time="2025-05-10T00:50:47.325693287Z" level=info msg="TearDown network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" successfully" May 10 00:50:47.328210 env[1773]: time="2025-05-10T00:50:47.325741861Z" level=info msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" returns successfully" May 10 00:50:47.330732 env[1773]: time="2025-05-10T00:50:47.330676216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-dv2zf,Uid:39f79222-38bb-468f-b90b-4139334f1c3a,Namespace:calico-apiserver,Attempt:1,}" May 10 00:50:47.396459 systemd-networkd[1435]: calid29a21f6985: Gained IPv6LL May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.085 [INFO][4825] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.085 [INFO][4825] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" iface="eth0" netns="/var/run/netns/cni-dc920bf9-355e-cc57-e0a1-c9e18c63a2c6" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.085 [INFO][4825] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" iface="eth0" netns="/var/run/netns/cni-dc920bf9-355e-cc57-e0a1-c9e18c63a2c6" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.086 [INFO][4825] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" iface="eth0" netns="/var/run/netns/cni-dc920bf9-355e-cc57-e0a1-c9e18c63a2c6" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.086 [INFO][4825] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.086 [INFO][4825] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.363 [INFO][4851] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.367 [INFO][4851] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.367 [INFO][4851] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.381 [WARNING][4851] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.381 [INFO][4851] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.383 [INFO][4851] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.403152 env[1773]: 2025-05-10 00:50:47.399 [INFO][4825] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:47.409435 systemd[1]: run-netns-cni\x2ddc920bf9\x2d355e\x2dcc57\x2de0a1\x2dc9e18c63a2c6.mount: Deactivated successfully. May 10 00:50:47.414786 env[1773]: time="2025-05-10T00:50:47.413451892Z" level=info msg="TearDown network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" successfully" May 10 00:50:47.414786 env[1773]: time="2025-05-10T00:50:47.413507412Z" level=info msg="StopPodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" returns successfully" May 10 00:50:47.414786 env[1773]: time="2025-05-10T00:50:47.414670116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jd8tc,Uid:249fb49c-38b8-4d34-9673-4fa848de7e21,Namespace:calico-system,Attempt:1,}" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.225 [INFO][4834] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.226 [INFO][4834] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" iface="eth0" netns="/var/run/netns/cni-86509935-b369-754d-0ffa-46d409a29e96" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.226 [INFO][4834] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" iface="eth0" netns="/var/run/netns/cni-86509935-b369-754d-0ffa-46d409a29e96" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.226 [INFO][4834] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" iface="eth0" netns="/var/run/netns/cni-86509935-b369-754d-0ffa-46d409a29e96" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.226 [INFO][4834] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.226 [INFO][4834] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.372 [INFO][4871] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.408 [INFO][4871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.408 [INFO][4871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.418 [WARNING][4871] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.418 [INFO][4871] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.422 [INFO][4871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.428037 env[1773]: 2025-05-10 00:50:47.424 [INFO][4834] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:47.434841 env[1773]: time="2025-05-10T00:50:47.428163888Z" level=info msg="TearDown network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" successfully" May 10 00:50:47.434841 env[1773]: time="2025-05-10T00:50:47.428200122Z" level=info msg="StopPodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" returns successfully" May 10 00:50:47.434841 env[1773]: time="2025-05-10T00:50:47.429054217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d949dddc-k4hpq,Uid:197a4730-7f05-4393-bd9a-f474f7cbde84,Namespace:calico-system,Attempt:1,}" May 10 00:50:47.432392 systemd[1]: run-netns-cni\x2d86509935\x2db369\x2d754d\x2d0ffa\x2d46d409a29e96.mount: Deactivated successfully. May 10 00:50:47.692361 systemd-networkd[1435]: calide6810cd12d: Link UP May 10 00:50:47.697604 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calide6810cd12d: link becomes ready May 10 00:50:47.697967 systemd-networkd[1435]: calide6810cd12d: Gained carrier May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.460 [INFO][4885] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0 calico-apiserver-6c4c664698- calico-apiserver 39f79222-38bb-468f-b90b-4139334f1c3a 867 0 2025-05-10 00:50:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6c4c664698 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-21-73 calico-apiserver-6c4c664698-dv2zf eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calide6810cd12d [] []}} ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.461 [INFO][4885] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.609 [INFO][4918] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.621 [INFO][4918] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a6360), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-21-73", "pod":"calico-apiserver-6c4c664698-dv2zf", "timestamp":"2025-05-10 00:50:47.609835855 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.621 [INFO][4918] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.621 [INFO][4918] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.621 [INFO][4918] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.623 [INFO][4918] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.629 [INFO][4918] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.639 [INFO][4918] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.649 [INFO][4918] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.653 [INFO][4918] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.653 [INFO][4918] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.655 [INFO][4918] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68 May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.663 [INFO][4918] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.674 [INFO][4918] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.197/26] block=192.168.51.192/26 handle="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.674 [INFO][4918] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.197/26] handle="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" host="ip-172-31-21-73" May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.674 [INFO][4918] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.744113 env[1773]: 2025-05-10 00:50:47.674 [INFO][4918] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.197/26] IPv6=[] ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.745330 env[1773]: 2025-05-10 00:50:47.677 [INFO][4885] cni-plugin/k8s.go 386: Populated endpoint ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"39f79222-38bb-468f-b90b-4139334f1c3a", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"calico-apiserver-6c4c664698-dv2zf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide6810cd12d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.745330 env[1773]: 2025-05-10 00:50:47.678 [INFO][4885] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.197/32] ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.745330 env[1773]: 2025-05-10 00:50:47.678 [INFO][4885] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calide6810cd12d ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.745330 env[1773]: 2025-05-10 00:50:47.702 [INFO][4885] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.745330 env[1773]: 2025-05-10 00:50:47.705 [INFO][4885] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"39f79222-38bb-468f-b90b-4139334f1c3a", ResourceVersion:"867", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68", Pod:"calico-apiserver-6c4c664698-dv2zf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide6810cd12d", MAC:"3a:ea:59:09:25:b2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.745330 env[1773]: 2025-05-10 00:50:47.721 [INFO][4885] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Namespace="calico-apiserver" Pod="calico-apiserver-6c4c664698-dv2zf" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:47.770000 audit[4956]: NETFILTER_CFG table=filter:111 family=2 entries=52 op=nft_register_chain pid=4956 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:47.770000 audit[4956]: SYSCALL arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7fff5a73edb0 a2=0 a3=7fff5a73ed9c items=0 ppid=4056 pid=4956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.770000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:47.781974 systemd-networkd[1435]: cali3abe9943ff7: Link UP May 10 00:50:47.786787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:47.787759 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3abe9943ff7: link becomes ready May 10 00:50:47.787896 systemd-networkd[1435]: cali3abe9943ff7: Gained carrier May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.573 [INFO][4917] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0 csi-node-driver- calico-system 249fb49c-38b8-4d34-9673-4fa848de7e21 866 0 2025-05-10 00:50:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-21-73 csi-node-driver-jd8tc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3abe9943ff7 [] []}} ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.573 [INFO][4917] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.657 [INFO][4940] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" HandleID="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.681 [INFO][4940] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" HandleID="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029f520), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-73", "pod":"csi-node-driver-jd8tc", "timestamp":"2025-05-10 00:50:47.657460488 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.681 [INFO][4940] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.681 [INFO][4940] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.681 [INFO][4940] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.685 [INFO][4940] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.691 [INFO][4940] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.700 [INFO][4940] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.703 [INFO][4940] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.715 [INFO][4940] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.716 [INFO][4940] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.722 [INFO][4940] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.742 [INFO][4940] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.761 [INFO][4940] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.198/26] block=192.168.51.192/26 handle="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.761 [INFO][4940] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.198/26] handle="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" host="ip-172-31-21-73" May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.762 [INFO][4940] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.841695 env[1773]: 2025-05-10 00:50:47.762 [INFO][4940] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.198/26] IPv6=[] ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" HandleID="k8s-pod-network.d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.844934 env[1773]: 2025-05-10 00:50:47.772 [INFO][4917] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"249fb49c-38b8-4d34-9673-4fa848de7e21", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"csi-node-driver-jd8tc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3abe9943ff7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.844934 env[1773]: 2025-05-10 00:50:47.772 [INFO][4917] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.198/32] ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.844934 env[1773]: 2025-05-10 00:50:47.773 [INFO][4917] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3abe9943ff7 ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.844934 env[1773]: 2025-05-10 00:50:47.789 [INFO][4917] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.844934 env[1773]: 2025-05-10 00:50:47.791 [INFO][4917] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"249fb49c-38b8-4d34-9673-4fa848de7e21", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d", Pod:"csi-node-driver-jd8tc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3abe9943ff7", MAC:"52:15:da:3d:39:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.844934 env[1773]: 2025-05-10 00:50:47.827 [INFO][4917] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d" Namespace="calico-system" Pod="csi-node-driver-jd8tc" WorkloadEndpoint="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:47.861000 audit[4969]: NETFILTER_CFG table=filter:112 family=2 entries=50 op=nft_register_chain pid=4969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:47.861000 audit[4969]: SYSCALL arch=c000003e syscall=46 success=yes exit=23884 a0=3 a1=7fff322a7530 a2=0 a3=7fff322a751c items=0 ppid=4056 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.861000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:47.868223 systemd-networkd[1435]: cali3331cb3267a: Link UP May 10 00:50:47.876885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3331cb3267a: link becomes ready May 10 00:50:47.877186 systemd-networkd[1435]: cali3331cb3267a: Gained carrier May 10 00:50:47.922206 env[1773]: time="2025-05-10T00:50:47.916866527Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:47.922206 env[1773]: time="2025-05-10T00:50:47.917020382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:47.922206 env[1773]: time="2025-05-10T00:50:47.917053771Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:47.922206 env[1773]: time="2025-05-10T00:50:47.917323474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68 pid=4982 runtime=io.containerd.runc.v2 May 10 00:50:47.925000 audit[4998]: NETFILTER_CFG table=filter:113 family=2 entries=56 op=nft_register_chain pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.539 [INFO][4903] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0 calico-kube-controllers-68d949dddc- calico-system 197a4730-7f05-4393-bd9a-f474f7cbde84 876 0 2025-05-10 00:50:18 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:68d949dddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-21-73 calico-kube-controllers-68d949dddc-k4hpq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3331cb3267a [] []}} ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.539 [INFO][4903] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.683 [INFO][4935] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.742 [INFO][4935] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002914c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-73", "pod":"calico-kube-controllers-68d949dddc-k4hpq", "timestamp":"2025-05-10 00:50:47.683874882 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.742 [INFO][4935] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.761 [INFO][4935] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.761 [INFO][4935] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.765 [INFO][4935] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.772 [INFO][4935] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.794 [INFO][4935] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.810 [INFO][4935] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.819 [INFO][4935] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.819 [INFO][4935] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.830 [INFO][4935] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.841 [INFO][4935] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.858 [INFO][4935] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.199/26] block=192.168.51.192/26 handle="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.858 [INFO][4935] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.199/26] handle="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" host="ip-172-31-21-73" May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.858 [INFO][4935] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.928058 env[1773]: 2025-05-10 00:50:47.858 [INFO][4935] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.199/26] IPv6=[] ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.929221 env[1773]: 2025-05-10 00:50:47.865 [INFO][4903] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0", GenerateName:"calico-kube-controllers-68d949dddc-", Namespace:"calico-system", SelfLink:"", UID:"197a4730-7f05-4393-bd9a-f474f7cbde84", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d949dddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"calico-kube-controllers-68d949dddc-k4hpq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.51.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3331cb3267a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.929221 env[1773]: 2025-05-10 00:50:47.865 [INFO][4903] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.199/32] ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.929221 env[1773]: 2025-05-10 00:50:47.865 [INFO][4903] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3331cb3267a ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.929221 env[1773]: 2025-05-10 00:50:47.878 [INFO][4903] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.929221 env[1773]: 2025-05-10 00:50:47.882 [INFO][4903] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0", GenerateName:"calico-kube-controllers-68d949dddc-", Namespace:"calico-system", SelfLink:"", UID:"197a4730-7f05-4393-bd9a-f474f7cbde84", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d949dddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a", Pod:"calico-kube-controllers-68d949dddc-k4hpq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.51.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3331cb3267a", MAC:"96:36:92:fe:95:9d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.929221 env[1773]: 2025-05-10 00:50:47.909 [INFO][4903] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Namespace="calico-system" Pod="calico-kube-controllers-68d949dddc-k4hpq" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:47.925000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=26228 a0=3 a1=7ffc4b7460e0 a2=0 a3=7ffc4b7460cc items=0 ppid=4056 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.925000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:47.997608 env[1773]: time="2025-05-10T00:50:47.996380834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:47.997608 env[1773]: time="2025-05-10T00:50:47.996433608Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:47.997608 env[1773]: time="2025-05-10T00:50:47.996449051Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:47.997608 env[1773]: time="2025-05-10T00:50:47.997276943Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d pid=5032 runtime=io.containerd.runc.v2 May 10 00:50:48.054272 env[1773]: time="2025-05-10T00:50:48.054217805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c4c664698-dv2zf,Uid:39f79222-38bb-468f-b90b-4139334f1c3a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\"" May 10 00:50:48.067375 env[1773]: time="2025-05-10T00:50:48.067294171Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:48.067624 env[1773]: time="2025-05-10T00:50:48.067595409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:48.067765 env[1773]: time="2025-05-10T00:50:48.067739684Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:48.068132 env[1773]: time="2025-05-10T00:50:48.068098464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a pid=5065 runtime=io.containerd.runc.v2 May 10 00:50:48.105292 env[1773]: time="2025-05-10T00:50:48.105248320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jd8tc,Uid:249fb49c-38b8-4d34-9673-4fa848de7e21,Namespace:calico-system,Attempt:1,} returns sandbox id \"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d\"" May 10 00:50:48.127793 systemd[1]: run-containerd-runc-k8s.io-ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a-runc.JPUCjV.mount: Deactivated successfully. May 10 00:50:48.248595 env[1773]: time="2025-05-10T00:50:48.248465859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68d949dddc-k4hpq,Uid:197a4730-7f05-4393-bd9a-f474f7cbde84,Namespace:calico-system,Attempt:1,} returns sandbox id \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\"" May 10 00:50:48.288071 systemd-networkd[1435]: cali0e3cb83e7f6: Gained IPv6LL May 10 00:50:48.534911 env[1773]: time="2025-05-10T00:50:48.534794781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.538865 env[1773]: time="2025-05-10T00:50:48.538821058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.541632 env[1773]: time="2025-05-10T00:50:48.541596987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.544196 env[1773]: time="2025-05-10T00:50:48.544157174Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.544729 env[1773]: time="2025-05-10T00:50:48.544692759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:50:48.545928 env[1773]: time="2025-05-10T00:50:48.545817981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:50:48.550022 env[1773]: time="2025-05-10T00:50:48.549983451Z" level=info msg="CreateContainer within sandbox \"26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:48.570765 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3248760282.mount: Deactivated successfully. May 10 00:50:48.579399 env[1773]: time="2025-05-10T00:50:48.579342523Z" level=info msg="CreateContainer within sandbox \"26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6a19cd971af3f68445303eba7e841bf11aafe6475d4a7fc9f1560d9cc133c14e\"" May 10 00:50:48.581526 env[1773]: time="2025-05-10T00:50:48.581472298Z" level=info msg="StartContainer for \"6a19cd971af3f68445303eba7e841bf11aafe6475d4a7fc9f1560d9cc133c14e\"" May 10 00:50:48.665650 env[1773]: time="2025-05-10T00:50:48.665602820Z" level=info msg="StartContainer for \"6a19cd971af3f68445303eba7e841bf11aafe6475d4a7fc9f1560d9cc133c14e\" returns successfully" May 10 00:50:48.855591 env[1773]: time="2025-05-10T00:50:48.855529191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.859615 env[1773]: time="2025-05-10T00:50:48.859575326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.862793 env[1773]: time="2025-05-10T00:50:48.862762346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.865825 env[1773]: time="2025-05-10T00:50:48.865786331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.866343 env[1773]: time="2025-05-10T00:50:48.866309567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:50:48.868388 env[1773]: time="2025-05-10T00:50:48.868358106Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:50:48.870538 env[1773]: time="2025-05-10T00:50:48.870465614Z" level=info msg="CreateContainer within sandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:48.894271 env[1773]: time="2025-05-10T00:50:48.894218159Z" level=info msg="CreateContainer within sandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\"" May 10 00:50:48.895311 env[1773]: time="2025-05-10T00:50:48.895274216Z" level=info msg="StartContainer for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\"" May 10 00:50:49.025725 env[1773]: time="2025-05-10T00:50:49.025675207Z" level=info msg="StartContainer for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" returns successfully" May 10 00:50:49.184666 systemd-networkd[1435]: calide6810cd12d: Gained IPv6LL May 10 00:50:49.185009 systemd-networkd[1435]: cali3abe9943ff7: Gained IPv6LL May 10 00:50:49.193522 kubelet[2789]: I0510 00:50:49.193428 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6c4c664698-srrfv" podStartSLOduration=29.488460163 podStartE2EDuration="31.193406784s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:47.163257835 +0000 UTC m=+52.596586216" lastFinishedPulling="2025-05-10 00:50:48.868204455 +0000 UTC m=+54.301532837" observedRunningTime="2025-05-10 00:50:49.192045848 +0000 UTC m=+54.625374237" watchObservedRunningTime="2025-05-10 00:50:49.193406784 +0000 UTC m=+54.626735172" May 10 00:50:49.195477 env[1773]: time="2025-05-10T00:50:49.194362201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.199813 env[1773]: time="2025-05-10T00:50:49.199295603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.203668 env[1773]: time="2025-05-10T00:50:49.203631935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.208565 env[1773]: time="2025-05-10T00:50:49.208524934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:49.209739 env[1773]: time="2025-05-10T00:50:49.209693626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:50:49.211770 env[1773]: time="2025-05-10T00:50:49.211741665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:50:49.217185 env[1773]: time="2025-05-10T00:50:49.217144914Z" level=info msg="CreateContainer within sandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:49.260268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3454971083.mount: Deactivated successfully. May 10 00:50:49.274316 env[1773]: time="2025-05-10T00:50:49.274263613Z" level=info msg="CreateContainer within sandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\"" May 10 00:50:49.275262 env[1773]: time="2025-05-10T00:50:49.275227612Z" level=info msg="StartContainer for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\"" May 10 00:50:49.313000 audit[5202]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=5202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.313000 audit[5202]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffffb40ba50 a2=0 a3=7ffffb40ba3c items=0 ppid=3020 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.323000 audit[5202]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.323000 audit[5202]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffffb40ba50 a2=0 a3=7ffffb40ba3c items=0 ppid=3020 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.374000 audit[5212]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=5212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.374000 audit[5212]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffedfa473f0 a2=0 a3=7ffedfa473dc items=0 ppid=3020 pid=5212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.379000 audit[5212]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=5212 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.379000 audit[5212]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffedfa473f0 a2=0 a3=7ffedfa473dc items=0 ppid=3020 pid=5212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.495666 env[1773]: time="2025-05-10T00:50:49.495523147Z" level=info msg="StartContainer for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" returns successfully" May 10 00:50:49.694042 systemd-networkd[1435]: cali3331cb3267a: Gained IPv6LL May 10 00:50:50.077345 systemd[1]: run-containerd-runc-k8s.io-8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225-runc.9CpMd5.mount: Deactivated successfully. May 10 00:50:50.186505 kubelet[2789]: I0510 00:50:50.186102 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:50.207551 kubelet[2789]: I0510 00:50:50.207449 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b9fb45589-d24jc" podStartSLOduration=27.238444822 podStartE2EDuration="32.207427036s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:43.57662609 +0000 UTC m=+49.009954455" lastFinishedPulling="2025-05-10 00:50:48.54560821 +0000 UTC m=+53.978936669" observedRunningTime="2025-05-10 00:50:49.221850855 +0000 UTC m=+54.655179243" watchObservedRunningTime="2025-05-10 00:50:50.207427036 +0000 UTC m=+55.640755425" May 10 00:50:50.336000 audit[5227]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=5227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:50.336000 audit[5227]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffeeb308450 a2=0 a3=7ffeeb30843c items=0 ppid=3020 pid=5227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:50.342000 audit[5227]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:50.342000 audit[5227]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeeb308450 a2=0 a3=7ffeeb30843c items=0 ppid=3020 pid=5227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:50.722408 env[1773]: time="2025-05-10T00:50:50.722290378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.726404 env[1773]: time="2025-05-10T00:50:50.726356611Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.729652 env[1773]: time="2025-05-10T00:50:50.729612767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.732519 env[1773]: time="2025-05-10T00:50:50.732465248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.732841 env[1773]: time="2025-05-10T00:50:50.732805249Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:50:50.739060 env[1773]: time="2025-05-10T00:50:50.739024936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:50:50.741624 env[1773]: time="2025-05-10T00:50:50.740649430Z" level=info msg="CreateContainer within sandbox \"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:50:50.782047 env[1773]: time="2025-05-10T00:50:50.781991935Z" level=info msg="CreateContainer within sandbox \"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d4fe30098584241e414f643ba913af2744e80cf01daf8b8cd2537462ce6131b6\"" May 10 00:50:50.783066 env[1773]: time="2025-05-10T00:50:50.783029219Z" level=info msg="StartContainer for \"d4fe30098584241e414f643ba913af2744e80cf01daf8b8cd2537462ce6131b6\"" May 10 00:50:50.983798 env[1773]: time="2025-05-10T00:50:50.983689334Z" level=info msg="StartContainer for \"d4fe30098584241e414f643ba913af2744e80cf01daf8b8cd2537462ce6131b6\" returns successfully" May 10 00:50:51.077119 systemd[1]: run-containerd-runc-k8s.io-d4fe30098584241e414f643ba913af2744e80cf01daf8b8cd2537462ce6131b6-runc.zuQDSK.mount: Deactivated successfully. May 10 00:50:51.189937 kubelet[2789]: I0510 00:50:51.189045 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:51.189937 kubelet[2789]: I0510 00:50:51.189791 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:51.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.73:22-139.178.89.65:48224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:51.698144 systemd[1]: Started sshd@9-172.31.21.73:22-139.178.89.65:48224.service. May 10 00:50:51.700811 kernel: kauditd_printk_skb: 55 callbacks suppressed May 10 00:50:51.700894 kernel: audit: type=1130 audit(1746838251.696:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.73:22-139.178.89.65:48224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:51.762476 kubelet[2789]: I0510 00:50:51.762247 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6c4c664698-dv2zf" podStartSLOduration=32.607129554 podStartE2EDuration="33.762223099s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:48.056374002 +0000 UTC m=+53.489702372" lastFinishedPulling="2025-05-10 00:50:49.211467536 +0000 UTC m=+54.644795917" observedRunningTime="2025-05-10 00:50:50.20857904 +0000 UTC m=+55.641907425" watchObservedRunningTime="2025-05-10 00:50:51.762223099 +0000 UTC m=+57.195551505" May 10 00:50:51.823000 audit[5264]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.828503 kernel: audit: type=1325 audit(1746838251.823:438): table=filter:120 family=2 entries=9 op=nft_register_rule pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.823000 audit[5264]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc7f9ded80 a2=0 a3=7ffc7f9ded6c items=0 ppid=3020 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.843593 kernel: audit: type=1300 audit(1746838251.823:438): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc7f9ded80 a2=0 a3=7ffc7f9ded6c items=0 ppid=3020 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.846617 kernel: audit: type=1327 audit(1746838251.823:438): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.845000 audit[5264]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.857605 kernel: audit: type=1325 audit(1746838251.845:439): table=nat:121 family=2 entries=27 op=nft_register_chain pid=5264 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.857734 kernel: audit: type=1300 audit(1746838251.845:439): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7f9ded80 a2=0 a3=7ffc7f9ded6c items=0 ppid=3020 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.845000 audit[5264]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7f9ded80 a2=0 a3=7ffc7f9ded6c items=0 ppid=3020 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.862541 kernel: audit: type=1327 audit(1746838251.845:439): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.964000 audit[5261]: USER_ACCT pid=5261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:51.973580 kernel: audit: type=1101 audit(1746838251.964:440): pid=5261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:51.974877 sshd[5261]: Accepted publickey for core from 139.178.89.65 port 48224 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:51.973000 audit[5261]: CRED_ACQ pid=5261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:51.979511 kernel: audit: type=1103 audit(1746838251.973:441): pid=5261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:51.981000 audit[5261]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedcdd1b00 a2=3 a3=0 items=0 ppid=1 pid=5261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.981000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:51.987597 kernel: audit: type=1006 audit(1746838251.981:442): pid=5261 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:50:51.991208 sshd[5261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:52.003135 systemd[1]: Started session-10.scope. May 10 00:50:52.004592 systemd-logind[1758]: New session 10 of user core. May 10 00:50:52.024000 audit[5261]: USER_START pid=5261 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:52.027000 audit[5266]: CRED_ACQ pid=5266 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.094559 sshd[5261]: pam_unix(sshd:session): session closed for user core May 10 00:50:53.099000 audit[5261]: USER_END pid=5261 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.099000 audit[5261]: CRED_DISP pid=5261 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.104997 systemd-logind[1758]: Session 10 logged out. Waiting for processes to exit. May 10 00:50:53.105450 systemd[1]: sshd@9-172.31.21.73:22-139.178.89.65:48224.service: Deactivated successfully. May 10 00:50:53.106597 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:50:53.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.21.73:22-139.178.89.65:48224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:53.108341 systemd-logind[1758]: Removed session 10. May 10 00:50:53.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.73:22-139.178.89.65:48236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:53.120914 systemd[1]: Started sshd@10-172.31.21.73:22-139.178.89.65:48236.service. May 10 00:50:53.294000 audit[5285]: USER_ACCT pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.296459 sshd[5285]: Accepted publickey for core from 139.178.89.65 port 48236 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:53.296000 audit[5285]: CRED_ACQ pid=5285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.297000 audit[5285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e74de30 a2=3 a3=0 items=0 ppid=1 pid=5285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:53.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:53.299409 sshd[5285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:53.306443 systemd[1]: Started session-11.scope. May 10 00:50:53.308263 systemd-logind[1758]: New session 11 of user core. May 10 00:50:53.319000 audit[5285]: USER_START pid=5285 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.321000 audit[5288]: CRED_ACQ pid=5288 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.548023 env[1773]: time="2025-05-10T00:50:53.547802968Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:53.550787 env[1773]: time="2025-05-10T00:50:53.550552568Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:53.554643 env[1773]: time="2025-05-10T00:50:53.554605424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:53.557660 env[1773]: time="2025-05-10T00:50:53.557247025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:53.557660 env[1773]: time="2025-05-10T00:50:53.557496568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:50:53.560817 env[1773]: time="2025-05-10T00:50:53.559246550Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:50:53.612706 env[1773]: time="2025-05-10T00:50:53.612659395Z" level=info msg="CreateContainer within sandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:50:53.639311 env[1773]: time="2025-05-10T00:50:53.639142671Z" level=info msg="CreateContainer within sandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\"" May 10 00:50:53.643406 env[1773]: time="2025-05-10T00:50:53.643352740Z" level=info msg="StartContainer for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\"" May 10 00:50:53.789516 env[1773]: time="2025-05-10T00:50:53.789450137Z" level=info msg="StartContainer for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" returns successfully" May 10 00:50:53.865841 sshd[5285]: pam_unix(sshd:session): session closed for user core May 10 00:50:53.865000 audit[5285]: USER_END pid=5285 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.866000 audit[5285]: CRED_DISP pid=5285 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:53.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.21.73:22-139.178.89.65:48236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:53.882564 systemd[1]: sshd@10-172.31.21.73:22-139.178.89.65:48236.service: Deactivated successfully. May 10 00:50:53.885715 systemd-logind[1758]: Session 11 logged out. Waiting for processes to exit. May 10 00:50:53.891906 systemd[1]: Started sshd@11-172.31.21.73:22-139.178.89.65:48240.service. May 10 00:50:53.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.73:22-139.178.89.65:48240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:53.895166 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:50:53.902134 systemd-logind[1758]: Removed session 11. May 10 00:50:54.095000 audit[5333]: USER_ACCT pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:54.097307 sshd[5333]: Accepted publickey for core from 139.178.89.65 port 48240 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:54.096000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:54.096000 audit[5333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcab47de0 a2=3 a3=0 items=0 ppid=1 pid=5333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:54.096000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:54.100155 sshd[5333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:54.106215 systemd[1]: Started session-12.scope. May 10 00:50:54.106730 systemd-logind[1758]: New session 12 of user core. May 10 00:50:54.110000 audit[5333]: USER_START pid=5333 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:54.112000 audit[5336]: CRED_ACQ pid=5336 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:54.429709 sshd[5333]: pam_unix(sshd:session): session closed for user core May 10 00:50:54.429000 audit[5333]: USER_END pid=5333 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:54.429000 audit[5333]: CRED_DISP pid=5333 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:54.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.21.73:22-139.178.89.65:48240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:54.432275 systemd[1]: sshd@11-172.31.21.73:22-139.178.89.65:48240.service: Deactivated successfully. May 10 00:50:54.433315 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:50:54.433847 systemd-logind[1758]: Session 12 logged out. Waiting for processes to exit. May 10 00:50:54.435188 systemd-logind[1758]: Removed session 12. May 10 00:50:54.472507 kubelet[2789]: I0510 00:50:54.472431 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-68d949dddc-k4hpq" podStartSLOduration=31.16458956 podStartE2EDuration="36.472405001s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:48.250907064 +0000 UTC m=+53.684235445" lastFinishedPulling="2025-05-10 00:50:53.558722521 +0000 UTC m=+58.992050886" observedRunningTime="2025-05-10 00:50:54.215111488 +0000 UTC m=+59.648439876" watchObservedRunningTime="2025-05-10 00:50:54.472405001 +0000 UTC m=+59.905733388" May 10 00:50:54.600284 systemd[1]: run-containerd-runc-k8s.io-8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b-runc.fdbn6i.mount: Deactivated successfully. May 10 00:50:54.893963 env[1773]: time="2025-05-10T00:50:54.893584220Z" level=info msg="StopPodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\"" May 10 00:50:55.360343 env[1773]: time="2025-05-10T00:50:55.360293806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.366583 env[1773]: time="2025-05-10T00:50:55.366537901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.380702 env[1773]: time="2025-05-10T00:50:55.380662009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.380993 env[1773]: time="2025-05-10T00:50:55.380946802Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:50:55.384612 env[1773]: time="2025-05-10T00:50:55.382932619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.432562 env[1773]: time="2025-05-10T00:50:55.432384597Z" level=info msg="CreateContainer within sandbox \"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:50:55.458085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount527093399.mount: Deactivated successfully. May 10 00:50:55.463076 env[1773]: time="2025-05-10T00:50:55.463017595Z" level=info msg="CreateContainer within sandbox \"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fed4659f625398b38db7d8dc3953d25e288024c7cd2c8c7e9e1a8d31c868f959\"" May 10 00:50:55.464911 env[1773]: time="2025-05-10T00:50:55.464866611Z" level=info msg="StartContainer for \"fed4659f625398b38db7d8dc3953d25e288024c7cd2c8c7e9e1a8d31c868f959\"" May 10 00:50:55.582800 env[1773]: time="2025-05-10T00:50:55.582718134Z" level=info msg="StartContainer for \"fed4659f625398b38db7d8dc3953d25e288024c7cd2c8c7e9e1a8d31c868f959\" returns successfully" May 10 00:50:55.600324 systemd[1]: run-containerd-runc-k8s.io-fed4659f625398b38db7d8dc3953d25e288024c7cd2c8c7e9e1a8d31c868f959-runc.J3jHHM.mount: Deactivated successfully. May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.555 [WARNING][5379] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0", GenerateName:"calico-apiserver-7b9fb45589-", Namespace:"calico-apiserver", SelfLink:"", UID:"ddb95e1e-8567-465e-85ac-1e86d059a924", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b9fb45589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3", Pod:"calico-apiserver-7b9fb45589-d24jc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f83015a277", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.559 [INFO][5379] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.559 [INFO][5379] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" iface="eth0" netns="" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.559 [INFO][5379] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.559 [INFO][5379] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.893 [INFO][5411] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.898 [INFO][5411] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.899 [INFO][5411] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.921 [WARNING][5411] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.921 [INFO][5411] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.923 [INFO][5411] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:55.927344 env[1773]: 2025-05-10 00:50:55.925 [INFO][5379] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:55.931837 env[1773]: time="2025-05-10T00:50:55.927357028Z" level=info msg="TearDown network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" successfully" May 10 00:50:55.931837 env[1773]: time="2025-05-10T00:50:55.927384607Z" level=info msg="StopPodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" returns successfully" May 10 00:50:55.957783 env[1773]: time="2025-05-10T00:50:55.957740010Z" level=info msg="RemovePodSandbox for \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\"" May 10 00:50:55.957919 env[1773]: time="2025-05-10T00:50:55.957784493Z" level=info msg="Forcibly stopping sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\"" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.005 [WARNING][5444] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0", GenerateName:"calico-apiserver-7b9fb45589-", Namespace:"calico-apiserver", SelfLink:"", UID:"ddb95e1e-8567-465e-85ac-1e86d059a924", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b9fb45589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"26856571b18f8bba2157850b3556dd90ecba8a89e3b43f51c8089ec5e3f507f3", Pod:"calico-apiserver-7b9fb45589-d24jc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f83015a277", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.006 [INFO][5444] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.006 [INFO][5444] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" iface="eth0" netns="" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.006 [INFO][5444] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.006 [INFO][5444] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.054 [INFO][5451] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.054 [INFO][5451] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.054 [INFO][5451] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.066 [WARNING][5451] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.066 [INFO][5451] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" HandleID="k8s-pod-network.f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" Workload="ip--172--31--21--73-k8s-calico--apiserver--7b9fb45589--d24jc-eth0" May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.071 [INFO][5451] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:56.079019 env[1773]: 2025-05-10 00:50:56.075 [INFO][5444] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669" May 10 00:50:56.080708 env[1773]: time="2025-05-10T00:50:56.079032299Z" level=info msg="TearDown network for sandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" successfully" May 10 00:50:56.084813 env[1773]: time="2025-05-10T00:50:56.084692659Z" level=info msg="RemovePodSandbox \"f6673b8622846fc82f731958206a7103ce6d80ec1794f2bc1d670e44cd29a669\" returns successfully" May 10 00:50:56.088656 env[1773]: time="2025-05-10T00:50:56.088623604Z" level=info msg="StopPodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\"" May 10 00:50:56.112385 kubelet[2789]: I0510 00:50:56.108758 2789 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:50:56.116746 kubelet[2789]: I0510 00:50:56.116716 2789 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.155 [WARNING][5472] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"249fb49c-38b8-4d34-9673-4fa848de7e21", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d", Pod:"csi-node-driver-jd8tc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3abe9943ff7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.155 [INFO][5472] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.155 [INFO][5472] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" iface="eth0" netns="" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.155 [INFO][5472] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.155 [INFO][5472] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.203 [INFO][5479] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.204 [INFO][5479] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.204 [INFO][5479] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.214 [WARNING][5479] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.214 [INFO][5479] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.216 [INFO][5479] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:56.225415 env[1773]: 2025-05-10 00:50:56.221 [INFO][5472] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.225415 env[1773]: time="2025-05-10T00:50:56.225336698Z" level=info msg="TearDown network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" successfully" May 10 00:50:56.227247 env[1773]: time="2025-05-10T00:50:56.227080387Z" level=info msg="StopPodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" returns successfully" May 10 00:50:56.229096 env[1773]: time="2025-05-10T00:50:56.229045757Z" level=info msg="RemovePodSandbox for \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\"" May 10 00:50:56.229345 env[1773]: time="2025-05-10T00:50:56.229276909Z" level=info msg="Forcibly stopping sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\"" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.309 [WARNING][5497] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"249fb49c-38b8-4d34-9673-4fa848de7e21", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"d317e8fdad256183fd9a3ad16aa34e0943dea4456fa0c8b61199b0c9f34d910d", Pod:"csi-node-driver-jd8tc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.51.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3abe9943ff7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.310 [INFO][5497] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.310 [INFO][5497] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" iface="eth0" netns="" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.310 [INFO][5497] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.310 [INFO][5497] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.373 [INFO][5504] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.373 [INFO][5504] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.373 [INFO][5504] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.392 [WARNING][5504] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.393 [INFO][5504] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" HandleID="k8s-pod-network.b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" Workload="ip--172--31--21--73-k8s-csi--node--driver--jd8tc-eth0" May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.394 [INFO][5504] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:56.398940 env[1773]: 2025-05-10 00:50:56.396 [INFO][5497] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5" May 10 00:50:56.400166 env[1773]: time="2025-05-10T00:50:56.399413062Z" level=info msg="TearDown network for sandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" successfully" May 10 00:50:56.406752 kubelet[2789]: I0510 00:50:56.402594 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-jd8tc" podStartSLOduration=31.119312008 podStartE2EDuration="38.39664963s" podCreationTimestamp="2025-05-10 00:50:18 +0000 UTC" firstStartedPulling="2025-05-10 00:50:48.106792886 +0000 UTC m=+53.540121257" lastFinishedPulling="2025-05-10 00:50:55.384130504 +0000 UTC m=+60.817458879" observedRunningTime="2025-05-10 00:50:56.387735127 +0000 UTC m=+61.821063514" watchObservedRunningTime="2025-05-10 00:50:56.39664963 +0000 UTC m=+61.829978016" May 10 00:50:56.407164 env[1773]: time="2025-05-10T00:50:56.407107123Z" level=info msg="RemovePodSandbox \"b602eb2e35be63e296251a436979f4da1bb08c9bd46144664a8329cf40a30cd5\" returns successfully" May 10 00:50:56.407586 env[1773]: time="2025-05-10T00:50:56.407561260Z" level=info msg="StopPodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\"" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.447 [WARNING][5522] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5", Pod:"calico-apiserver-6c4c664698-srrfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e3cb83e7f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.448 [INFO][5522] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.448 [INFO][5522] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" iface="eth0" netns="" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.448 [INFO][5522] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.448 [INFO][5522] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.474 [INFO][5529] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.474 [INFO][5529] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.474 [INFO][5529] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.483 [WARNING][5529] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.483 [INFO][5529] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.485 [INFO][5529] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:56.488951 env[1773]: 2025-05-10 00:50:56.487 [INFO][5522] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.489965 env[1773]: time="2025-05-10T00:50:56.489234764Z" level=info msg="TearDown network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" successfully" May 10 00:50:56.489965 env[1773]: time="2025-05-10T00:50:56.489276766Z" level=info msg="StopPodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" returns successfully" May 10 00:50:56.501410 env[1773]: time="2025-05-10T00:50:56.501376023Z" level=info msg="RemovePodSandbox for \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\"" May 10 00:50:56.501688 env[1773]: time="2025-05-10T00:50:56.501640172Z" level=info msg="Forcibly stopping sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\"" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.548 [WARNING][5548] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5", Pod:"calico-apiserver-6c4c664698-srrfv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0e3cb83e7f6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.548 [INFO][5548] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.548 [INFO][5548] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" iface="eth0" netns="" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.548 [INFO][5548] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.548 [INFO][5548] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.587 [INFO][5557] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.587 [INFO][5557] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.587 [INFO][5557] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.595 [WARNING][5557] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.595 [INFO][5557] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" HandleID="k8s-pod-network.e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.597 [INFO][5557] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:56.601901 env[1773]: 2025-05-10 00:50:56.600 [INFO][5548] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6" May 10 00:50:56.603425 env[1773]: time="2025-05-10T00:50:56.602074060Z" level=info msg="TearDown network for sandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" successfully" May 10 00:50:56.608748 env[1773]: time="2025-05-10T00:50:56.608709226Z" level=info msg="RemovePodSandbox \"e203e4f6214c80f8f8b7891134b5805597896faca9af57ec1085e273ff920cd6\" returns successfully" May 10 00:50:56.624380 env[1773]: time="2025-05-10T00:50:56.624340289Z" level=info msg="StopPodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\"" May 10 00:50:56.720358 kubelet[2789]: I0510 00:50:56.720253 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.666 [WARNING][5576] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c77a7739-aefe-46a9-890c-f1b233600f13", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a", Pod:"coredns-7db6d8ff4d-56t4s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid29a21f6985", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.667 [INFO][5576] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.667 [INFO][5576] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" iface="eth0" netns="" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.667 [INFO][5576] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.667 [INFO][5576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.802 [INFO][5584] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.811 [INFO][5584] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.811 [INFO][5584] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.826 [WARNING][5584] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.827 [INFO][5584] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.833 [INFO][5584] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:56.843529 env[1773]: 2025-05-10 00:50:56.838 [INFO][5576] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:56.843529 env[1773]: time="2025-05-10T00:50:56.843082461Z" level=info msg="TearDown network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" successfully" May 10 00:50:56.843529 env[1773]: time="2025-05-10T00:50:56.843123212Z" level=info msg="StopPodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" returns successfully" May 10 00:50:56.859160 env[1773]: time="2025-05-10T00:50:56.859121079Z" level=info msg="RemovePodSandbox for \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\"" May 10 00:50:56.859325 env[1773]: time="2025-05-10T00:50:56.859163229Z" level=info msg="Forcibly stopping sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\"" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.044 [WARNING][5606] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"c77a7739-aefe-46a9-890c-f1b233600f13", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"2e33dbfa06eee3f0939a5efcba5cf532c74fe3b1190f00d5e5ec5635453f9d0a", Pod:"coredns-7db6d8ff4d-56t4s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid29a21f6985", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.045 [INFO][5606] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.045 [INFO][5606] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" iface="eth0" netns="" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.045 [INFO][5606] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.045 [INFO][5606] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.111 [INFO][5614] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.112 [INFO][5614] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.112 [INFO][5614] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.126 [WARNING][5614] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.126 [INFO][5614] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" HandleID="k8s-pod-network.b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--56t4s-eth0" May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.134 [INFO][5614] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:57.143755 env[1773]: 2025-05-10 00:50:57.137 [INFO][5606] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4" May 10 00:50:57.148642 env[1773]: time="2025-05-10T00:50:57.147989523Z" level=info msg="TearDown network for sandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" successfully" May 10 00:50:57.160732 env[1773]: time="2025-05-10T00:50:57.160620846Z" level=info msg="RemovePodSandbox \"b762a124a0faa6bdf7a8b7764ac8500fd58b9e739c35b03a512cdc7a512711e4\" returns successfully" May 10 00:50:57.188361 env[1773]: time="2025-05-10T00:50:57.188317429Z" level=info msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" May 10 00:50:57.205543 kubelet[2789]: I0510 00:50:57.205365 2789 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:57.242680 env[1773]: time="2025-05-10T00:50:57.240132803Z" level=info msg="StopContainer for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" with timeout 30 (s)" May 10 00:50:57.242680 env[1773]: time="2025-05-10T00:50:57.240669222Z" level=info msg="Stop container \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" with signal terminated" May 10 00:50:57.273000 audit[5644]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.278294 kernel: kauditd_printk_skb: 29 callbacks suppressed May 10 00:50:57.279579 kernel: audit: type=1325 audit(1746838257.273:466): table=filter:122 family=2 entries=8 op=nft_register_rule pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.273000 audit[5644]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd9b0fdb30 a2=0 a3=7ffd9b0fdb1c items=0 ppid=3020 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.297592 kernel: audit: type=1300 audit(1746838257.273:466): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd9b0fdb30 a2=0 a3=7ffd9b0fdb1c items=0 ppid=3020 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.314720 kernel: audit: type=1327 audit(1746838257.273:466): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.314855 kernel: audit: type=1325 audit(1746838257.298:467): table=nat:123 family=2 entries=34 op=nft_register_chain pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.298000 audit[5644]: NETFILTER_CFG table=nat:123 family=2 entries=34 op=nft_register_chain pid=5644 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.298000 audit[5644]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd9b0fdb30 a2=0 a3=7ffd9b0fdb1c items=0 ppid=3020 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.335627 kernel: audit: type=1300 audit(1746838257.298:467): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd9b0fdb30 a2=0 a3=7ffd9b0fdb1c items=0 ppid=3020 pid=5644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.343944 kernel: audit: type=1327 audit(1746838257.298:467): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.335000 audit[5657]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.352885 kernel: audit: type=1325 audit(1746838257.335:468): table=filter:124 family=2 entries=8 op=nft_register_rule pid=5657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.335000 audit[5657]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc1e0bf90 a2=0 a3=7ffcc1e0bf7c items=0 ppid=3020 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.368725 kernel: audit: type=1300 audit(1746838257.335:468): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcc1e0bf90 a2=0 a3=7ffcc1e0bf7c items=0 ppid=3020 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.375645 kernel: audit: type=1327 audit(1746838257.335:468): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.387162 kernel: audit: type=1325 audit(1746838257.354:469): table=nat:125 family=2 entries=36 op=nft_register_rule pid=5657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.354000 audit[5657]: NETFILTER_CFG table=nat:125 family=2 entries=36 op=nft_register_rule pid=5657 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:57.354000 audit[5657]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcc1e0bf90 a2=0 a3=7ffcc1e0bf7c items=0 ppid=3020 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:57.408128 env[1773]: time="2025-05-10T00:50:57.406523997Z" level=info msg="shim disconnected" id=8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225 May 10 00:50:57.408457 env[1773]: time="2025-05-10T00:50:57.408404686Z" level=warning msg="cleaning up after shim disconnected" id=8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225 namespace=k8s.io May 10 00:50:57.408614 env[1773]: time="2025-05-10T00:50:57.408596822Z" level=info msg="cleaning up dead shim" May 10 00:50:57.411959 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225-rootfs.mount: Deactivated successfully. May 10 00:50:57.453457 env[1773]: time="2025-05-10T00:50:57.453409939Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5669 runtime=io.containerd.runc.v2\n" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.306 [WARNING][5632] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"39f79222-38bb-468f-b90b-4139334f1c3a", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68", Pod:"calico-apiserver-6c4c664698-dv2zf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide6810cd12d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.307 [INFO][5632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.307 [INFO][5632] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" iface="eth0" netns="" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.307 [INFO][5632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.307 [INFO][5632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.422 [INFO][5655] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.422 [INFO][5655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.422 [INFO][5655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.455 [WARNING][5655] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.456 [INFO][5655] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.461 [INFO][5655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:57.468636 env[1773]: 2025-05-10 00:50:57.465 [INFO][5632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.470172 env[1773]: time="2025-05-10T00:50:57.470113143Z" level=info msg="TearDown network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" successfully" May 10 00:50:57.470350 env[1773]: time="2025-05-10T00:50:57.470327625Z" level=info msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" returns successfully" May 10 00:50:57.490563 env[1773]: time="2025-05-10T00:50:57.490514208Z" level=info msg="StopContainer for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" returns successfully" May 10 00:50:57.494105 env[1773]: time="2025-05-10T00:50:57.494048427Z" level=info msg="StopPodSandbox for \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\"" May 10 00:50:57.495317 env[1773]: time="2025-05-10T00:50:57.494150259Z" level=info msg="Container to stop \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:50:57.502758 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68-shm.mount: Deactivated successfully. May 10 00:50:57.506931 env[1773]: time="2025-05-10T00:50:57.506888963Z" level=info msg="RemovePodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" May 10 00:50:57.507442 env[1773]: time="2025-05-10T00:50:57.507389297Z" level=info msg="Forcibly stopping sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" May 10 00:50:57.579586 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68-rootfs.mount: Deactivated successfully. May 10 00:50:57.587119 env[1773]: time="2025-05-10T00:50:57.587059129Z" level=info msg="shim disconnected" id=341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68 May 10 00:50:57.589290 env[1773]: time="2025-05-10T00:50:57.589236373Z" level=warning msg="cleaning up after shim disconnected" id=341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68 namespace=k8s.io May 10 00:50:57.589705 env[1773]: time="2025-05-10T00:50:57.589683828Z" level=info msg="cleaning up dead shim" May 10 00:50:57.646257 env[1773]: time="2025-05-10T00:50:57.646180382Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5723 runtime=io.containerd.runc.v2\n" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.610 [WARNING][5703] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0", GenerateName:"calico-apiserver-6c4c664698-", Namespace:"calico-apiserver", SelfLink:"", UID:"39f79222-38bb-468f-b90b-4139334f1c3a", ResourceVersion:"1012", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c4c664698", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68", Pod:"calico-apiserver-6c4c664698-dv2zf", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.51.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calide6810cd12d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.611 [INFO][5703] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.611 [INFO][5703] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" iface="eth0" netns="" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.611 [INFO][5703] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.611 [INFO][5703] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.681 [INFO][5733] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.682 [INFO][5733] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.682 [INFO][5733] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.692 [WARNING][5733] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.692 [INFO][5733] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" HandleID="k8s-pod-network.072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.694 [INFO][5733] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:57.725047 env[1773]: 2025-05-10 00:50:57.700 [INFO][5703] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:57.725047 env[1773]: time="2025-05-10T00:50:57.723575890Z" level=info msg="TearDown network for sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" successfully" May 10 00:50:57.762375 env[1773]: time="2025-05-10T00:50:57.762322015Z" level=info msg="RemovePodSandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" returns successfully" May 10 00:50:57.763147 env[1773]: time="2025-05-10T00:50:57.763113072Z" level=info msg="StopPodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\"" May 10 00:50:57.818799 systemd-networkd[1435]: calide6810cd12d: Link DOWN May 10 00:50:57.818813 systemd-networkd[1435]: calide6810cd12d: Lost carrier May 10 00:50:58.071000 audit[5804]: NETFILTER_CFG table=filter:126 family=2 entries=52 op=nft_register_rule pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:58.071000 audit[5804]: SYSCALL arch=c000003e syscall=46 success=yes exit=7876 a0=3 a1=7fff6ef63410 a2=0 a3=7fff6ef633fc items=0 ppid=4056 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.071000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:58.079000 audit[5804]: NETFILTER_CFG table=filter:127 family=2 entries=4 op=nft_unregister_chain pid=5804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:58.079000 audit[5804]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7fff6ef63410 a2=0 a3=55b97a563000 items=0 ppid=4056 pid=5804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.079000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.802 [INFO][5759] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.803 [INFO][5759] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" iface="eth0" netns="/var/run/netns/cni-bcebe2f7-c7df-2745-0109-82b3b889c758" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.803 [INFO][5759] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" iface="eth0" netns="/var/run/netns/cni-bcebe2f7-c7df-2745-0109-82b3b889c758" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.819 [INFO][5759] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" after=16.560893ms iface="eth0" netns="/var/run/netns/cni-bcebe2f7-c7df-2745-0109-82b3b889c758" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.820 [INFO][5759] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.820 [INFO][5759] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.944 [INFO][5783] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.944 [INFO][5783] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:57.944 [INFO][5783] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:58.060 [INFO][5783] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:58.060 [INFO][5783] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:58.062 [INFO][5783] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:58.083314 env[1773]: 2025-05-10 00:50:58.078 [INFO][5759] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:50:58.083314 env[1773]: time="2025-05-10T00:50:58.082154434Z" level=info msg="TearDown network for sandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" successfully" May 10 00:50:58.083314 env[1773]: time="2025-05-10T00:50:58.082214023Z" level=info msg="StopPodSandbox for \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" returns successfully" May 10 00:50:58.084316 env[1773]: time="2025-05-10T00:50:58.084258729Z" level=info msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\"" May 10 00:50:58.084697 env[1773]: time="2025-05-10T00:50:58.084462629Z" level=error msg="StopPodSandbox for \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": not found" May 10 00:50:58.091392 systemd[1]: run-netns-cni\x2dbcebe2f7\x2dc7df\x2d2745\x2d0109\x2d82b3b889c758.mount: Deactivated successfully. May 10 00:50:58.099727 kubelet[2789]: E0510 00:50:58.099674 2789 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find sandbox \"072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba\": not found" podSandboxID="072cb932ce7fe43bc1622b30cd54771adce579e57d9aa7ee1a39c973bd42dbba" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:57.981 [WARNING][5777] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0", GenerateName:"calico-kube-controllers-68d949dddc-", Namespace:"calico-system", SelfLink:"", UID:"197a4730-7f05-4393-bd9a-f474f7cbde84", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d949dddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a", Pod:"calico-kube-controllers-68d949dddc-k4hpq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.51.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3331cb3267a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:57.982 [INFO][5777] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:57.982 [INFO][5777] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" iface="eth0" netns="" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:57.982 [INFO][5777] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:57.982 [INFO][5777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.116 [INFO][5798] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.117 [INFO][5798] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.117 [INFO][5798] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.130 [WARNING][5798] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.131 [INFO][5798] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.143 [INFO][5798] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:58.149507 env[1773]: 2025-05-10 00:50:58.145 [INFO][5777] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.149507 env[1773]: time="2025-05-10T00:50:58.148512529Z" level=info msg="TearDown network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" successfully" May 10 00:50:58.149507 env[1773]: time="2025-05-10T00:50:58.148555310Z" level=info msg="StopPodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" returns successfully" May 10 00:50:58.153756 env[1773]: time="2025-05-10T00:50:58.153717648Z" level=info msg="RemovePodSandbox for \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\"" May 10 00:50:58.154436 env[1773]: time="2025-05-10T00:50:58.154370708Z" level=info msg="Forcibly stopping sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\"" May 10 00:50:58.171000 audit[5822]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=5822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:58.171000 audit[5822]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd0c83dec0 a2=0 a3=7ffd0c83deac items=0 ppid=3020 pid=5822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:58.180000 audit[5822]: NETFILTER_CFG table=nat:129 family=2 entries=36 op=nft_register_rule pid=5822 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:58.180000 audit[5822]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd0c83dec0 a2=0 a3=7ffd0c83deac items=0 ppid=3020 pid=5822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:58.208786 kubelet[2789]: I0510 00:50:58.208744 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39f79222-38bb-468f-b90b-4139334f1c3a-calico-apiserver-certs\") pod \"39f79222-38bb-468f-b90b-4139334f1c3a\" (UID: \"39f79222-38bb-468f-b90b-4139334f1c3a\") " May 10 00:50:58.209380 kubelet[2789]: I0510 00:50:58.208856 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-j8ps7\" (UniqueName: \"kubernetes.io/projected/39f79222-38bb-468f-b90b-4139334f1c3a-kube-api-access-j8ps7\") pod \"39f79222-38bb-468f-b90b-4139334f1c3a\" (UID: \"39f79222-38bb-468f-b90b-4139334f1c3a\") " May 10 00:50:58.270065 systemd[1]: var-lib-kubelet-pods-39f79222\x2d38bb\x2d468f\x2db90b\x2d4139334f1c3a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dj8ps7.mount: Deactivated successfully. May 10 00:50:58.278875 kubelet[2789]: I0510 00:50:58.278817 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/39f79222-38bb-468f-b90b-4139334f1c3a-kube-api-access-j8ps7" (OuterVolumeSpecName: "kube-api-access-j8ps7") pod "39f79222-38bb-468f-b90b-4139334f1c3a" (UID: "39f79222-38bb-468f-b90b-4139334f1c3a"). InnerVolumeSpecName "kube-api-access-j8ps7". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:50:58.295239 kubelet[2789]: I0510 00:50:58.293168 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/39f79222-38bb-468f-b90b-4139334f1c3a-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "39f79222-38bb-468f-b90b-4139334f1c3a" (UID: "39f79222-38bb-468f-b90b-4139334f1c3a"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:50:58.310154 kubelet[2789]: I0510 00:50:58.310105 2789 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-j8ps7\" (UniqueName: \"kubernetes.io/projected/39f79222-38bb-468f-b90b-4139334f1c3a-kube-api-access-j8ps7\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:50:58.311369 kubelet[2789]: I0510 00:50:58.310164 2789 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/39f79222-38bb-468f-b90b-4139334f1c3a-calico-apiserver-certs\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.240 [WARNING][5821] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0", GenerateName:"calico-kube-controllers-68d949dddc-", Namespace:"calico-system", SelfLink:"", UID:"197a4730-7f05-4393-bd9a-f474f7cbde84", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68d949dddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a", Pod:"calico-kube-controllers-68d949dddc-k4hpq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.51.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3331cb3267a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.240 [INFO][5821] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.240 [INFO][5821] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" iface="eth0" netns="" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.240 [INFO][5821] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.240 [INFO][5821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.316 [INFO][5829] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.316 [INFO][5829] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.316 [INFO][5829] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.324 [WARNING][5829] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.324 [INFO][5829] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" HandleID="k8s-pod-network.dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.325 [INFO][5829] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:58.332856 env[1773]: 2025-05-10 00:50:58.330 [INFO][5821] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5" May 10 00:50:58.332856 env[1773]: time="2025-05-10T00:50:58.332731486Z" level=info msg="TearDown network for sandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" successfully" May 10 00:50:58.341727 env[1773]: time="2025-05-10T00:50:58.341629386Z" level=info msg="RemovePodSandbox \"dc4fcedd9d32047b5a1fef020e24598a9e768cea48285b1320e86f790cd0c9e5\" returns successfully" May 10 00:50:58.343529 env[1773]: time="2025-05-10T00:50:58.343478515Z" level=info msg="StopPodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\"" May 10 00:50:58.406571 systemd[1]: var-lib-kubelet-pods-39f79222\x2d38bb\x2d468f\x2db90b\x2d4139334f1c3a-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.392 [WARNING][5852] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34494f4b-79ac-454b-9580-9ca26c3a43dc", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21", Pod:"coredns-7db6d8ff4d-xthsq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5753cb02631", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.392 [INFO][5852] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.392 [INFO][5852] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" iface="eth0" netns="" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.393 [INFO][5852] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.393 [INFO][5852] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.424 [INFO][5860] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.424 [INFO][5860] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.424 [INFO][5860] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.430 [WARNING][5860] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.431 [INFO][5860] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.432 [INFO][5860] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:58.437213 env[1773]: 2025-05-10 00:50:58.434 [INFO][5852] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.438086 env[1773]: time="2025-05-10T00:50:58.438050409Z" level=info msg="TearDown network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" successfully" May 10 00:50:58.438283 env[1773]: time="2025-05-10T00:50:58.438186393Z" level=info msg="StopPodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" returns successfully" May 10 00:50:58.439342 env[1773]: time="2025-05-10T00:50:58.439119113Z" level=info msg="RemovePodSandbox for \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\"" May 10 00:50:58.439342 env[1773]: time="2025-05-10T00:50:58.439160806Z" level=info msg="Forcibly stopping sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\"" May 10 00:50:58.478147 kubelet[2789]: I0510 00:50:58.478099 2789 scope.go:117] "RemoveContainer" containerID="8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225" May 10 00:50:58.502104 env[1773]: time="2025-05-10T00:50:58.502064619Z" level=info msg="RemoveContainer for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\"" May 10 00:50:58.514441 env[1773]: time="2025-05-10T00:50:58.514215984Z" level=info msg="RemoveContainer for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" returns successfully" May 10 00:50:58.515551 kubelet[2789]: I0510 00:50:58.515337 2789 scope.go:117] "RemoveContainer" containerID="8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225" May 10 00:50:58.520389 env[1773]: time="2025-05-10T00:50:58.518246751Z" level=error msg="ContainerStatus for \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\": not found" May 10 00:50:58.520836 kubelet[2789]: E0510 00:50:58.520803 2789 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\": not found" containerID="8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225" May 10 00:50:58.524154 kubelet[2789]: I0510 00:50:58.524076 2789 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225"} err="failed to get container status \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\": rpc error: code = NotFound desc = an error occurred when try to find container \"8f3929bbdbba2072b1f506b90a1e374d62fcc20b8a6d27ed8a1e39a272220225\": not found" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.543 [WARNING][5880] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"34494f4b-79ac-454b-9580-9ca26c3a43dc", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"ebe5ed6d1b9bf54ec3a7305fbd43f7ceea974d9aaadeef6f6cb1367de116de21", Pod:"coredns-7db6d8ff4d-xthsq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5753cb02631", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.545 [INFO][5880] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.545 [INFO][5880] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" iface="eth0" netns="" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.545 [INFO][5880] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.545 [INFO][5880] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.570 [INFO][5887] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.570 [INFO][5887] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.570 [INFO][5887] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.578 [WARNING][5887] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.578 [INFO][5887] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" HandleID="k8s-pod-network.c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" Workload="ip--172--31--21--73-k8s-coredns--7db6d8ff4d--xthsq-eth0" May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.579 [INFO][5887] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:58.583564 env[1773]: 2025-05-10 00:50:58.581 [INFO][5880] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc" May 10 00:50:58.584161 env[1773]: time="2025-05-10T00:50:58.584120856Z" level=info msg="TearDown network for sandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" successfully" May 10 00:50:58.590020 env[1773]: time="2025-05-10T00:50:58.589947442Z" level=info msg="RemovePodSandbox \"c5d1837426fd9e2f0cfbabde0aec2ee332fcf5046eed63125d4680e26f393abc\" returns successfully" May 10 00:50:58.853011 kubelet[2789]: I0510 00:50:58.852897 2789 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="39f79222-38bb-468f-b90b-4139334f1c3a" path="/var/lib/kubelet/pods/39f79222-38bb-468f-b90b-4139334f1c3a/volumes" May 10 00:50:59.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.73:22-139.178.89.65:53002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:59.454468 systemd[1]: Started sshd@12-172.31.21.73:22-139.178.89.65:53002.service. May 10 00:50:59.668000 audit[5895]: USER_ACCT pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:59.669968 sshd[5895]: Accepted publickey for core from 139.178.89.65 port 53002 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:59.670000 audit[5895]: CRED_ACQ pid=5895 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:59.670000 audit[5895]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff636ef250 a2=3 a3=0 items=0 ppid=1 pid=5895 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:59.670000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:59.675835 sshd[5895]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:59.684261 systemd[1]: Started session-13.scope. May 10 00:50:59.684801 systemd-logind[1758]: New session 13 of user core. May 10 00:50:59.687000 audit[5895]: USER_START pid=5895 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:59.689000 audit[5898]: CRED_ACQ pid=5898 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:00.361708 sshd[5895]: pam_unix(sshd:session): session closed for user core May 10 00:51:00.361000 audit[5895]: USER_END pid=5895 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:00.361000 audit[5895]: CRED_DISP pid=5895 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:00.365246 systemd[1]: sshd@12-172.31.21.73:22-139.178.89.65:53002.service: Deactivated successfully. May 10 00:51:00.366077 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:51:00.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.21.73:22-139.178.89.65:53002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:00.366876 systemd-logind[1758]: Session 13 logged out. Waiting for processes to exit. May 10 00:51:00.367853 systemd-logind[1758]: Removed session 13. May 10 00:51:01.353182 systemd[1]: run-containerd-runc-k8s.io-8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b-runc.i9Tanx.mount: Deactivated successfully. May 10 00:51:01.486000 audit[5928]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:01.486000 audit[5928]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffff7ff9bd0 a2=0 a3=7ffff7ff9bbc items=0 ppid=3020 pid=5928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:01.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:01.494000 audit[5928]: NETFILTER_CFG table=nat:131 family=2 entries=36 op=nft_register_rule pid=5928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:01.494000 audit[5928]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffff7ff9bd0 a2=0 a3=7ffff7ff9bbc items=0 ppid=3020 pid=5928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:01.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.391220 kernel: kauditd_printk_skb: 31 callbacks suppressed May 10 00:51:05.391344 kernel: audit: type=1130 audit(1746838265.385:485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.73:22-139.178.89.65:53012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:05.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.73:22-139.178.89.65:53012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:05.386325 systemd[1]: Started sshd@13-172.31.21.73:22-139.178.89.65:53012.service. May 10 00:51:05.460151 kernel: audit: type=1325 audit(1746838265.451:486): table=filter:132 family=2 entries=8 op=nft_register_rule pid=5940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.460261 kernel: audit: type=1300 audit(1746838265.451:486): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7a331600 a2=0 a3=7ffd7a3315ec items=0 ppid=3020 pid=5940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.451000 audit[5940]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=5940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.451000 audit[5940]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd7a331600 a2=0 a3=7ffd7a3315ec items=0 ppid=3020 pid=5940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.467515 env[1773]: time="2025-05-10T00:51:05.465763234Z" level=info msg="StopContainer for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" with timeout 30 (s)" May 10 00:51:05.467515 env[1773]: time="2025-05-10T00:51:05.466327484Z" level=info msg="Stop container \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" with signal terminated" May 10 00:51:05.473996 kernel: audit: type=1327 audit(1746838265.451:486): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.488659 kernel: audit: type=1325 audit(1746838265.473:487): table=nat:133 family=2 entries=40 op=nft_register_chain pid=5940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.488773 kernel: audit: type=1300 audit(1746838265.473:487): arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffd7a331600 a2=0 a3=7ffd7a3315ec items=0 ppid=3020 pid=5940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.473000 audit[5940]: NETFILTER_CFG table=nat:133 family=2 entries=40 op=nft_register_chain pid=5940 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.473000 audit[5940]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffd7a331600 a2=0 a3=7ffd7a3315ec items=0 ppid=3020 pid=5940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.505839 kernel: audit: type=1327 audit(1746838265.473:487): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.501000 audit[5948]: NETFILTER_CFG table=filter:134 family=2 entries=8 op=nft_register_rule pid=5948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.501000 audit[5948]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdcab07ea0 a2=0 a3=7ffdcab07e8c items=0 ppid=3020 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.513318 kernel: audit: type=1325 audit(1746838265.501:488): table=filter:134 family=2 entries=8 op=nft_register_rule pid=5948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.513425 kernel: audit: type=1300 audit(1746838265.501:488): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdcab07ea0 a2=0 a3=7ffdcab07e8c items=0 ppid=3020 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.526557 kernel: audit: type=1327 audit(1746838265.501:488): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.522000 audit[5948]: NETFILTER_CFG table=nat:135 family=2 entries=40 op=nft_unregister_chain pid=5948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:05.522000 audit[5948]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffdcab07ea0 a2=0 a3=7ffdcab07e8c items=0 ppid=3020 pid=5948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:05.549391 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458-rootfs.mount: Deactivated successfully. May 10 00:51:05.551652 env[1773]: time="2025-05-10T00:51:05.551340429Z" level=info msg="shim disconnected" id=ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458 May 10 00:51:05.551652 env[1773]: time="2025-05-10T00:51:05.551383241Z" level=warning msg="cleaning up after shim disconnected" id=ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458 namespace=k8s.io May 10 00:51:05.551652 env[1773]: time="2025-05-10T00:51:05.551392359Z" level=info msg="cleaning up dead shim" May 10 00:51:05.555000 audit[5937]: USER_ACCT pid=5937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:05.557692 sshd[5937]: Accepted publickey for core from 139.178.89.65 port 53012 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:05.557000 audit[5937]: CRED_ACQ pid=5937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:05.557000 audit[5937]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7def03d0 a2=3 a3=0 items=0 ppid=1 pid=5937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:05.559111 sshd[5937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:05.564463 systemd[1]: Started session-14.scope. May 10 00:51:05.564852 systemd-logind[1758]: New session 14 of user core. May 10 00:51:05.568013 env[1773]: time="2025-05-10T00:51:05.567916690Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5963 runtime=io.containerd.runc.v2\n" May 10 00:51:05.572000 audit[5937]: USER_START pid=5937 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:05.574000 audit[5979]: CRED_ACQ pid=5979 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:05.623374 env[1773]: time="2025-05-10T00:51:05.623330963Z" level=info msg="StopContainer for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" returns successfully" May 10 00:51:05.624145 env[1773]: time="2025-05-10T00:51:05.624112205Z" level=info msg="StopPodSandbox for \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\"" May 10 00:51:05.628609 env[1773]: time="2025-05-10T00:51:05.624178583Z" level=info msg="Container to stop \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:05.627311 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5-shm.mount: Deactivated successfully. May 10 00:51:05.654344 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5-rootfs.mount: Deactivated successfully. May 10 00:51:05.657019 env[1773]: time="2025-05-10T00:51:05.656953433Z" level=info msg="shim disconnected" id=1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5 May 10 00:51:05.657143 env[1773]: time="2025-05-10T00:51:05.657021405Z" level=warning msg="cleaning up after shim disconnected" id=1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5 namespace=k8s.io May 10 00:51:05.657143 env[1773]: time="2025-05-10T00:51:05.657031434Z" level=info msg="cleaning up dead shim" May 10 00:51:05.671606 env[1773]: time="2025-05-10T00:51:05.671555752Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5999 runtime=io.containerd.runc.v2\n" May 10 00:51:05.776577 systemd-networkd[1435]: cali0e3cb83e7f6: Link DOWN May 10 00:51:05.776587 systemd-networkd[1435]: cali0e3cb83e7f6: Lost carrier May 10 00:51:05.833000 audit[6051]: NETFILTER_CFG table=filter:136 family=2 entries=44 op=nft_register_rule pid=6051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:05.833000 audit[6051]: SYSCALL arch=c000003e syscall=46 success=yes exit=6568 a0=3 a1=7ffffc965690 a2=0 a3=7ffffc96567c items=0 ppid=4056 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.833000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:05.834000 audit[6051]: NETFILTER_CFG table=filter:137 family=2 entries=2 op=nft_unregister_chain pid=6051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:05.834000 audit[6051]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffffc965690 a2=0 a3=5556efc0b000 items=0 ppid=4056 pid=6051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:05.834000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:05.849786 sshd[5937]: pam_unix(sshd:session): session closed for user core May 10 00:51:05.849000 audit[5937]: USER_END pid=5937 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:05.849000 audit[5937]: CRED_DISP pid=5937 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:05.852797 systemd[1]: sshd@13-172.31.21.73:22-139.178.89.65:53012.service: Deactivated successfully. May 10 00:51:05.853782 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:51:05.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.21.73:22-139.178.89.65:53012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:05.856168 systemd-logind[1758]: Session 14 logged out. Waiting for processes to exit. May 10 00:51:05.858013 systemd-logind[1758]: Removed session 14. May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.774 [INFO][6033] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.775 [INFO][6033] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" iface="eth0" netns="/var/run/netns/cni-29c20c6a-4bbd-fc57-3dff-062ad13e22e6" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.775 [INFO][6033] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" iface="eth0" netns="/var/run/netns/cni-29c20c6a-4bbd-fc57-3dff-062ad13e22e6" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.786 [INFO][6033] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" after=11.305289ms iface="eth0" netns="/var/run/netns/cni-29c20c6a-4bbd-fc57-3dff-062ad13e22e6" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.786 [INFO][6033] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.787 [INFO][6033] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.849 [INFO][6042] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.859 [INFO][6042] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.859 [INFO][6042] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.903 [INFO][6042] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.903 [INFO][6042] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.904 [INFO][6042] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:05.909960 env[1773]: 2025-05-10 00:51:05.907 [INFO][6033] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:05.915191 systemd[1]: run-netns-cni\x2d29c20c6a\x2d4bbd\x2dfc57\x2d3dff\x2d062ad13e22e6.mount: Deactivated successfully. May 10 00:51:05.916479 env[1773]: time="2025-05-10T00:51:05.916433617Z" level=info msg="TearDown network for sandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" successfully" May 10 00:51:05.916479 env[1773]: time="2025-05-10T00:51:05.916470631Z" level=info msg="StopPodSandbox for \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" returns successfully" May 10 00:51:06.068500 kubelet[2789]: I0510 00:51:06.068390 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-calico-apiserver-certs\") pod \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\" (UID: \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\") " May 10 00:51:06.068939 kubelet[2789]: I0510 00:51:06.068552 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-qgxrl\" (UniqueName: \"kubernetes.io/projected/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-kube-api-access-qgxrl\") pod \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\" (UID: \"bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0\") " May 10 00:51:06.076390 systemd[1]: var-lib-kubelet-pods-bdf4b636\x2dc1cc\x2d456f\x2d9f6f\x2d97e9a3ba75d0-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dqgxrl.mount: Deactivated successfully. May 10 00:51:06.076570 systemd[1]: var-lib-kubelet-pods-bdf4b636\x2dc1cc\x2d456f\x2d9f6f\x2d97e9a3ba75d0-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:51:06.079195 kubelet[2789]: I0510 00:51:06.079143 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" (UID: "bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:51:06.079330 kubelet[2789]: I0510 00:51:06.079313 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-kube-api-access-qgxrl" (OuterVolumeSpecName: "kube-api-access-qgxrl") pod "bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" (UID: "bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0"). InnerVolumeSpecName "kube-api-access-qgxrl". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:51:06.169284 kubelet[2789]: I0510 00:51:06.169154 2789 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-qgxrl\" (UniqueName: \"kubernetes.io/projected/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-kube-api-access-qgxrl\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:06.169284 kubelet[2789]: I0510 00:51:06.169191 2789 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0-calico-apiserver-certs\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:06.544000 audit[6059]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=6059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:06.544000 audit[6059]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca464afc0 a2=0 a3=7ffca464afac items=0 ppid=3020 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:06.550000 audit[6059]: NETFILTER_CFG table=nat:139 family=2 entries=36 op=nft_register_rule pid=6059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:06.550000 audit[6059]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffca464afc0 a2=0 a3=7ffca464afac items=0 ppid=3020 pid=6059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:06.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:06.553192 kubelet[2789]: I0510 00:51:06.553157 2789 scope.go:117] "RemoveContainer" containerID="ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458" May 10 00:51:06.554776 env[1773]: time="2025-05-10T00:51:06.554740289Z" level=info msg="RemoveContainer for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\"" May 10 00:51:06.561174 env[1773]: time="2025-05-10T00:51:06.561122526Z" level=info msg="RemoveContainer for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" returns successfully" May 10 00:51:06.562540 kubelet[2789]: I0510 00:51:06.561669 2789 scope.go:117] "RemoveContainer" containerID="ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458" May 10 00:51:06.562540 kubelet[2789]: E0510 00:51:06.562208 2789 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\": not found" containerID="ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458" May 10 00:51:06.562540 kubelet[2789]: I0510 00:51:06.562252 2789 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458"} err="failed to get container status \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\": rpc error: code = NotFound desc = an error occurred when try to find container \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\": not found" May 10 00:51:06.562741 env[1773]: time="2025-05-10T00:51:06.561966147Z" level=error msg="ContainerStatus for \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"ef7366507c97c681e272023eaf0e05f56705f9a48b67f90c0d89efd7d09cf458\": not found" May 10 00:51:06.851055 kubelet[2789]: I0510 00:51:06.850988 2789 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" path="/var/lib/kubelet/pods/bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0/volumes" May 10 00:51:10.877503 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:51:10.877648 kernel: audit: type=1130 audit(1746838270.871:502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.73:22-139.178.89.65:50724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.73:22-139.178.89.65:50724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.872883 systemd[1]: Started sshd@14-172.31.21.73:22-139.178.89.65:50724.service. May 10 00:51:11.032000 audit[6064]: USER_ACCT pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.034663 sshd[6064]: Accepted publickey for core from 139.178.89.65 port 50724 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:11.042676 kernel: audit: type=1101 audit(1746838271.032:503): pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.042804 kernel: audit: type=1103 audit(1746838271.037:504): pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.037000 audit[6064]: CRED_ACQ pid=6064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.039766 sshd[6064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:11.044515 kernel: audit: type=1006 audit(1746838271.037:505): pid=6064 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:51:11.037000 audit[6064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee649bdb0 a2=3 a3=0 items=0 ppid=1 pid=6064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.049873 kernel: audit: type=1300 audit(1746838271.037:505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee649bdb0 a2=3 a3=0 items=0 ppid=1 pid=6064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.051306 kernel: audit: type=1327 audit(1746838271.037:505): proctitle=737368643A20636F7265205B707269765D May 10 00:51:11.037000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:11.052123 systemd[1]: Started session-15.scope. May 10 00:51:11.052609 systemd-logind[1758]: New session 15 of user core. May 10 00:51:11.057000 audit[6064]: USER_START pid=6064 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.057000 audit[6067]: CRED_ACQ pid=6067 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.067698 kernel: audit: type=1105 audit(1746838271.057:506): pid=6064 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.067797 kernel: audit: type=1103 audit(1746838271.057:507): pid=6067 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.250658 sshd[6064]: pam_unix(sshd:session): session closed for user core May 10 00:51:11.251000 audit[6064]: USER_END pid=6064 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.251000 audit[6064]: CRED_DISP pid=6064 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.261351 systemd[1]: sshd@14-172.31.21.73:22-139.178.89.65:50724.service: Deactivated successfully. May 10 00:51:11.262518 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:51:11.264636 systemd-logind[1758]: Session 15 logged out. Waiting for processes to exit. May 10 00:51:11.265986 systemd-logind[1758]: Removed session 15. May 10 00:51:11.268975 kernel: audit: type=1106 audit(1746838271.251:508): pid=6064 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.269089 kernel: audit: type=1104 audit(1746838271.251:509): pid=6064 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.21.73:22-139.178.89.65:50724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:14.317676 systemd[1]: run-containerd-runc-k8s.io-8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b-runc.zUOExc.mount: Deactivated successfully. May 10 00:51:16.283526 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:16.283710 kernel: audit: type=1130 audit(1746838276.274:511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.73:22-139.178.89.65:50730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:16.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.73:22-139.178.89.65:50730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:16.275822 systemd[1]: Started sshd@15-172.31.21.73:22-139.178.89.65:50730.service. May 10 00:51:16.486000 audit[6119]: USER_ACCT pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.488989 sshd[6119]: Accepted publickey for core from 139.178.89.65 port 50730 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:16.496526 kernel: audit: type=1101 audit(1746838276.486:512): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.495000 audit[6119]: CRED_ACQ pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.499187 sshd[6119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:16.503704 kernel: audit: type=1103 audit(1746838276.495:513): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.503809 kernel: audit: type=1006 audit(1746838276.495:514): pid=6119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:51:16.509618 kernel: audit: type=1300 audit(1746838276.495:514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb37ebf70 a2=3 a3=0 items=0 ppid=1 pid=6119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.495000 audit[6119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb37ebf70 a2=3 a3=0 items=0 ppid=1 pid=6119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:16.514268 systemd[1]: Started session-16.scope. May 10 00:51:16.514634 systemd-logind[1758]: New session 16 of user core. May 10 00:51:16.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:16.518596 kernel: audit: type=1327 audit(1746838276.495:514): proctitle=737368643A20636F7265205B707269765D May 10 00:51:16.519000 audit[6119]: USER_START pid=6119 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.535114 kernel: audit: type=1105 audit(1746838276.519:515): pid=6119 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.535247 kernel: audit: type=1103 audit(1746838276.520:516): pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.520000 audit[6122]: CRED_ACQ pid=6122 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.829746 sshd[6119]: pam_unix(sshd:session): session closed for user core May 10 00:51:16.829000 audit[6119]: USER_END pid=6119 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.829000 audit[6119]: CRED_DISP pid=6119 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.840101 systemd[1]: sshd@15-172.31.21.73:22-139.178.89.65:50730.service: Deactivated successfully. May 10 00:51:16.840924 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:51:16.843689 systemd-logind[1758]: Session 16 logged out. Waiting for processes to exit. May 10 00:51:16.844911 systemd-logind[1758]: Removed session 16. May 10 00:51:16.845501 kernel: audit: type=1106 audit(1746838276.829:517): pid=6119 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.845577 kernel: audit: type=1104 audit(1746838276.829:518): pid=6119 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:16.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.21.73:22-139.178.89.65:50730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:16.855907 systemd[1]: Started sshd@16-172.31.21.73:22-139.178.89.65:41064.service. May 10 00:51:16.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.73:22-139.178.89.65:41064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:17.021000 audit[6132]: USER_ACCT pid=6132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.023030 sshd[6132]: Accepted publickey for core from 139.178.89.65 port 41064 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:17.022000 audit[6132]: CRED_ACQ pid=6132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.022000 audit[6132]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4c33ffe0 a2=3 a3=0 items=0 ppid=1 pid=6132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:17.022000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:17.024614 sshd[6132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:17.030161 systemd[1]: Started session-17.scope. May 10 00:51:17.031264 systemd-logind[1758]: New session 17 of user core. May 10 00:51:17.037000 audit[6132]: USER_START pid=6132 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.038000 audit[6135]: CRED_ACQ pid=6135 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.810110 sshd[6132]: pam_unix(sshd:session): session closed for user core May 10 00:51:17.811000 audit[6132]: USER_END pid=6132 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.811000 audit[6132]: CRED_DISP pid=6132 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.813548 systemd[1]: sshd@16-172.31.21.73:22-139.178.89.65:41064.service: Deactivated successfully. May 10 00:51:17.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.21.73:22-139.178.89.65:41064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:17.815018 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:51:17.815066 systemd-logind[1758]: Session 17 logged out. Waiting for processes to exit. May 10 00:51:17.816835 systemd-logind[1758]: Removed session 17. May 10 00:51:17.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.73:22-139.178.89.65:41072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:17.833811 systemd[1]: Started sshd@17-172.31.21.73:22-139.178.89.65:41072.service. May 10 00:51:18.003000 audit[6143]: USER_ACCT pid=6143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:18.005561 sshd[6143]: Accepted publickey for core from 139.178.89.65 port 41072 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:18.005000 audit[6143]: CRED_ACQ pid=6143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:18.005000 audit[6143]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff231b0a90 a2=3 a3=0 items=0 ppid=1 pid=6143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:18.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:18.006961 sshd[6143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:18.012427 systemd[1]: Started session-18.scope. May 10 00:51:18.012807 systemd-logind[1758]: New session 18 of user core. May 10 00:51:18.017000 audit[6143]: USER_START pid=6143 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:18.018000 audit[6146]: CRED_ACQ pid=6146 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:20.456329 env[1773]: time="2025-05-10T00:51:20.454947572Z" level=info msg="StopContainer for \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\" with timeout 300 (s)" May 10 00:51:20.456329 env[1773]: time="2025-05-10T00:51:20.455501823Z" level=info msg="Stop container \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\" with signal terminated" May 10 00:51:20.576000 audit[6162]: NETFILTER_CFG table=filter:140 family=2 entries=8 op=nft_register_rule pid=6162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.576000 audit[6162]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd2f4277f0 a2=0 a3=7ffd2f4277dc items=0 ppid=3020 pid=6162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.576000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.584000 audit[6162]: NETFILTER_CFG table=nat:141 family=2 entries=30 op=nft_register_rule pid=6162 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.584000 audit[6162]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd2f4277f0 a2=0 a3=7ffd2f4277dc items=0 ppid=3020 pid=6162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.632256 env[1773]: time="2025-05-10T00:51:20.631611966Z" level=info msg="StopContainer for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" with timeout 30 (s)" May 10 00:51:20.632256 env[1773]: time="2025-05-10T00:51:20.632115866Z" level=info msg="Stop container \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" with signal terminated" May 10 00:51:20.646000 audit[6170]: NETFILTER_CFG table=filter:142 family=2 entries=8 op=nft_register_rule pid=6170 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.646000 audit[6170]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc57a3a6b0 a2=0 a3=7ffc57a3a69c items=0 ppid=3020 pid=6170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.676000 audit[6170]: NETFILTER_CFG table=nat:143 family=2 entries=22 op=nft_register_rule pid=6170 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:20.676000 audit[6170]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc57a3a6b0 a2=0 a3=7ffc57a3a69c items=0 ppid=3020 pid=6170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:20.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:20.744330 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b-rootfs.mount: Deactivated successfully. May 10 00:51:20.783377 env[1773]: time="2025-05-10T00:51:20.783314892Z" level=info msg="shim disconnected" id=8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b May 10 00:51:20.783672 env[1773]: time="2025-05-10T00:51:20.783380058Z" level=warning msg="cleaning up after shim disconnected" id=8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b namespace=k8s.io May 10 00:51:20.783672 env[1773]: time="2025-05-10T00:51:20.783393380Z" level=info msg="cleaning up dead shim" May 10 00:51:20.808187 env[1773]: time="2025-05-10T00:51:20.808139085Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6184 runtime=io.containerd.runc.v2\n" May 10 00:51:20.813865 env[1773]: time="2025-05-10T00:51:20.813810647Z" level=info msg="StopContainer for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" returns successfully" May 10 00:51:20.814511 env[1773]: time="2025-05-10T00:51:20.814448533Z" level=info msg="StopPodSandbox for \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\"" May 10 00:51:20.820015 env[1773]: time="2025-05-10T00:51:20.814544139Z" level=info msg="Container to stop \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:20.818938 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a-shm.mount: Deactivated successfully. May 10 00:51:20.883514 env[1773]: time="2025-05-10T00:51:20.880533460Z" level=info msg="shim disconnected" id=ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a May 10 00:51:20.883514 env[1773]: time="2025-05-10T00:51:20.880590576Z" level=warning msg="cleaning up after shim disconnected" id=ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a namespace=k8s.io May 10 00:51:20.883514 env[1773]: time="2025-05-10T00:51:20.880607048Z" level=info msg="cleaning up dead shim" May 10 00:51:20.883346 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a-rootfs.mount: Deactivated successfully. May 10 00:51:20.905534 env[1773]: time="2025-05-10T00:51:20.901718002Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6215 runtime=io.containerd.runc.v2\n" May 10 00:51:21.249581 systemd-networkd[1435]: cali3331cb3267a: Link DOWN May 10 00:51:21.249589 systemd-networkd[1435]: cali3331cb3267a: Lost carrier May 10 00:51:21.274083 sshd[6143]: pam_unix(sshd:session): session closed for user core May 10 00:51:21.286854 kernel: kauditd_printk_skb: 32 callbacks suppressed May 10 00:51:21.286972 kernel: audit: type=1106 audit(1746838281.280:539): pid=6143 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.280000 audit[6143]: USER_END pid=6143 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.289776 systemd[1]: Started sshd@18-172.31.21.73:22-139.178.89.65:41088.service. May 10 00:51:21.280000 audit[6256]: NETFILTER_CFG table=filter:144 family=2 entries=46 op=nft_register_rule pid=6256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:21.294679 kernel: audit: type=1325 audit(1746838281.280:540): table=filter:144 family=2 entries=46 op=nft_register_rule pid=6256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:21.280000 audit[6256]: SYSCALL arch=c000003e syscall=46 success=yes exit=6840 a0=3 a1=7fff60389790 a2=0 a3=7fff6038977c items=0 ppid=4056 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.300735 kernel: audit: type=1300 audit(1746838281.280:540): arch=c000003e syscall=46 success=yes exit=6840 a0=3 a1=7fff60389790 a2=0 a3=7fff6038977c items=0 ppid=4056 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.305132 systemd[1]: sshd@17-172.31.21.73:22-139.178.89.65:41072.service: Deactivated successfully. May 10 00:51:21.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:21.306067 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:51:21.309607 kernel: audit: type=1327 audit(1746838281.280:540): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:21.309074 systemd-logind[1758]: Session 18 logged out. Waiting for processes to exit. May 10 00:51:21.310599 systemd-logind[1758]: Removed session 18. May 10 00:51:21.281000 audit[6256]: NETFILTER_CFG table=filter:145 family=2 entries=6 op=nft_unregister_chain pid=6256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:21.320500 kernel: audit: type=1325 audit(1746838281.281:541): table=filter:145 family=2 entries=6 op=nft_unregister_chain pid=6256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:21.281000 audit[6256]: SYSCALL arch=c000003e syscall=46 success=yes exit=848 a0=3 a1=7fff60389790 a2=0 a3=56205342f000 items=0 ppid=4056 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.330295 kernel: audit: type=1300 audit(1746838281.281:541): arch=c000003e syscall=46 success=yes exit=848 a0=3 a1=7fff60389790 a2=0 a3=56205342f000 items=0 ppid=4056 pid=6256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.330412 kernel: audit: type=1327 audit(1746838281.281:541): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:21.281000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:21.288000 audit[6143]: CRED_DISP pid=6143 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.335522 kernel: audit: type=1104 audit(1746838281.288:542): pid=6143 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.73:22-139.178.89.65:41088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:21.341566 kernel: audit: type=1130 audit(1746838281.289:543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.73:22-139.178.89.65:41088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:21.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.73:22-139.178.89.65:41072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:21.350343 kernel: audit: type=1131 audit(1746838281.304:544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.21.73:22-139.178.89.65:41072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.243 [INFO][6242] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.244 [INFO][6242] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" iface="eth0" netns="/var/run/netns/cni-7da3700d-aa69-1dff-3c95-66833d96904e" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.244 [INFO][6242] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" iface="eth0" netns="/var/run/netns/cni-7da3700d-aa69-1dff-3c95-66833d96904e" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.252 [INFO][6242] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" after=8.425228ms iface="eth0" netns="/var/run/netns/cni-7da3700d-aa69-1dff-3c95-66833d96904e" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.253 [INFO][6242] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.253 [INFO][6242] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.426 [INFO][6252] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.428 [INFO][6252] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.429 [INFO][6252] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.479 [INFO][6252] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.479 [INFO][6252] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.483 [INFO][6252] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:21.489342 env[1773]: 2025-05-10 00:51:21.485 [INFO][6242] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:21.498992 systemd[1]: run-netns-cni\x2d7da3700d\x2daa69\x2d1dff\x2d3c95\x2d66833d96904e.mount: Deactivated successfully. May 10 00:51:21.504689 env[1773]: time="2025-05-10T00:51:21.503277952Z" level=info msg="TearDown network for sandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" successfully" May 10 00:51:21.504689 env[1773]: time="2025-05-10T00:51:21.503332916Z" level=info msg="StopPodSandbox for \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" returns successfully" May 10 00:51:21.520000 audit[6257]: USER_ACCT pid=6257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.522276 sshd[6257]: Accepted publickey for core from 139.178.89.65 port 41088 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:21.522000 audit[6257]: CRED_ACQ pid=6257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.523000 audit[6257]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5efe2dd0 a2=3 a3=0 items=0 ppid=1 pid=6257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.523000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:21.525983 sshd[6257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:21.540444 systemd[1]: Started session-19.scope. May 10 00:51:21.540966 systemd-logind[1758]: New session 19 of user core. May 10 00:51:21.546000 audit[6257]: USER_START pid=6257 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.548000 audit[6268]: CRED_ACQ pid=6268 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:21.704000 audit[6271]: NETFILTER_CFG table=filter:146 family=2 entries=20 op=nft_register_rule pid=6271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:21.704000 audit[6271]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffd5139020 a2=0 a3=7fffd513900c items=0 ppid=3020 pid=6271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:21.708000 audit[6271]: NETFILTER_CFG table=nat:147 family=2 entries=22 op=nft_register_rule pid=6271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:21.708000 audit[6271]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd5139020 a2=0 a3=0 items=0 ppid=3020 pid=6271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:21.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:21.720809 kubelet[2789]: I0510 00:51:21.720764 2789 scope.go:117] "RemoveContainer" containerID="8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b" May 10 00:51:21.738857 env[1773]: time="2025-05-10T00:51:21.738576992Z" level=info msg="RemoveContainer for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\"" May 10 00:51:21.744121 env[1773]: time="2025-05-10T00:51:21.744039569Z" level=info msg="RemoveContainer for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" returns successfully" May 10 00:51:21.744316 kubelet[2789]: I0510 00:51:21.744291 2789 scope.go:117] "RemoveContainer" containerID="8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b" May 10 00:51:21.745455 env[1773]: time="2025-05-10T00:51:21.745377148Z" level=error msg="ContainerStatus for \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\": not found" May 10 00:51:21.767110 kubelet[2789]: E0510 00:51:21.766990 2789 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\": not found" containerID="8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b" May 10 00:51:21.790799 kubelet[2789]: I0510 00:51:21.790388 2789 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b"} err="failed to get container status \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\": rpc error: code = NotFound desc = an error occurred when try to find container \"8f9b71e6491a1d37726b43d606560190be50ce8a7ef5005be6fc3081bbd4089b\": not found" May 10 00:51:21.794951 kubelet[2789]: I0510 00:51:21.794908 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/197a4730-7f05-4393-bd9a-f474f7cbde84-tigera-ca-bundle\") pod \"197a4730-7f05-4393-bd9a-f474f7cbde84\" (UID: \"197a4730-7f05-4393-bd9a-f474f7cbde84\") " May 10 00:51:21.815916 kubelet[2789]: I0510 00:51:21.815875 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-p6qrq\" (UniqueName: \"kubernetes.io/projected/197a4730-7f05-4393-bd9a-f474f7cbde84-kube-api-access-p6qrq\") pod \"197a4730-7f05-4393-bd9a-f474f7cbde84\" (UID: \"197a4730-7f05-4393-bd9a-f474f7cbde84\") " May 10 00:51:21.826822 systemd[1]: var-lib-kubelet-pods-197a4730\x2d7f05\x2d4393\x2dbd9a\x2df474f7cbde84-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 10 00:51:21.865625 kubelet[2789]: I0510 00:51:21.844769 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/197a4730-7f05-4393-bd9a-f474f7cbde84-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "197a4730-7f05-4393-bd9a-f474f7cbde84" (UID: "197a4730-7f05-4393-bd9a-f474f7cbde84"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:51:21.889814 systemd[1]: var-lib-kubelet-pods-197a4730\x2d7f05\x2d4393\x2dbd9a\x2df474f7cbde84-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dp6qrq.mount: Deactivated successfully. May 10 00:51:21.894441 kubelet[2789]: I0510 00:51:21.894373 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/197a4730-7f05-4393-bd9a-f474f7cbde84-kube-api-access-p6qrq" (OuterVolumeSpecName: "kube-api-access-p6qrq") pod "197a4730-7f05-4393-bd9a-f474f7cbde84" (UID: "197a4730-7f05-4393-bd9a-f474f7cbde84"). InnerVolumeSpecName "kube-api-access-p6qrq". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:51:21.917410 kubelet[2789]: I0510 00:51:21.917327 2789 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/197a4730-7f05-4393-bd9a-f474f7cbde84-tigera-ca-bundle\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:21.917603 kubelet[2789]: I0510 00:51:21.917591 2789 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-p6qrq\" (UniqueName: \"kubernetes.io/projected/197a4730-7f05-4393-bd9a-f474f7cbde84-kube-api-access-p6qrq\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:22.075080 kubelet[2789]: I0510 00:51:22.056695 2789 topology_manager.go:215] "Topology Admit Handler" podUID="22273003-f71b-440f-9dce-a1be7f04b090" podNamespace="calico-system" podName="calico-kube-controllers-6c4954c4f-w6kq8" May 10 00:51:22.124713 kubelet[2789]: E0510 00:51:22.124667 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="39f79222-38bb-468f-b90b-4139334f1c3a" containerName="calico-apiserver" May 10 00:51:22.124713 kubelet[2789]: E0510 00:51:22.124721 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" containerName="calico-apiserver" May 10 00:51:22.124904 kubelet[2789]: E0510 00:51:22.124730 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="197a4730-7f05-4393-bd9a-f474f7cbde84" containerName="calico-kube-controllers" May 10 00:51:22.129694 kubelet[2789]: I0510 00:51:22.129653 2789 memory_manager.go:354] "RemoveStaleState removing state" podUID="39f79222-38bb-468f-b90b-4139334f1c3a" containerName="calico-apiserver" May 10 00:51:22.129694 kubelet[2789]: I0510 00:51:22.129685 2789 memory_manager.go:354] "RemoveStaleState removing state" podUID="bdf4b636-c1cc-456f-9f6f-97e9a3ba75d0" containerName="calico-apiserver" May 10 00:51:22.129694 kubelet[2789]: I0510 00:51:22.129692 2789 memory_manager.go:354] "RemoveStaleState removing state" podUID="197a4730-7f05-4393-bd9a-f474f7cbde84" containerName="calico-kube-controllers" May 10 00:51:22.338093 kubelet[2789]: I0510 00:51:22.336649 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ffwl8\" (UniqueName: \"kubernetes.io/projected/22273003-f71b-440f-9dce-a1be7f04b090-kube-api-access-ffwl8\") pod \"calico-kube-controllers-6c4954c4f-w6kq8\" (UID: \"22273003-f71b-440f-9dce-a1be7f04b090\") " pod="calico-system/calico-kube-controllers-6c4954c4f-w6kq8" May 10 00:51:22.338093 kubelet[2789]: I0510 00:51:22.336744 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22273003-f71b-440f-9dce-a1be7f04b090-tigera-ca-bundle\") pod \"calico-kube-controllers-6c4954c4f-w6kq8\" (UID: \"22273003-f71b-440f-9dce-a1be7f04b090\") " pod="calico-system/calico-kube-controllers-6c4954c4f-w6kq8" May 10 00:51:22.768308 env[1773]: time="2025-05-10T00:51:22.767807137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c4954c4f-w6kq8,Uid:22273003-f71b-440f-9dce-a1be7f04b090,Namespace:calico-system,Attempt:0,}" May 10 00:51:22.873273 kubelet[2789]: I0510 00:51:22.872707 2789 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="197a4730-7f05-4393-bd9a-f474f7cbde84" path="/var/lib/kubelet/pods/197a4730-7f05-4393-bd9a-f474f7cbde84/volumes" May 10 00:51:23.079895 sshd[6257]: pam_unix(sshd:session): session closed for user core May 10 00:51:23.081000 audit[6257]: USER_END pid=6257 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.081000 audit[6257]: CRED_DISP pid=6257 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.21.73:22-139.178.89.65:41088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:23.084237 systemd[1]: sshd@18-172.31.21.73:22-139.178.89.65:41088.service: Deactivated successfully. May 10 00:51:23.085313 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:51:23.089546 systemd-logind[1758]: Session 19 logged out. Waiting for processes to exit. May 10 00:51:23.091645 systemd-logind[1758]: Removed session 19. May 10 00:51:23.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.73:22-139.178.89.65:41102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:23.103117 systemd[1]: Started sshd@19-172.31.21.73:22-139.178.89.65:41102.service. May 10 00:51:23.319000 audit[6309]: USER_ACCT pid=6309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.321133 sshd[6309]: Accepted publickey for core from 139.178.89.65 port 41102 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:23.326974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:51:23.330314 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17857099583: link becomes ready May 10 00:51:23.320000 audit[6309]: CRED_ACQ pid=6309 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.320000 audit[6309]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdde378fe0 a2=3 a3=0 items=0 ppid=1 pid=6309 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:23.329072 sshd[6309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:23.329387 systemd-networkd[1435]: cali17857099583: Link UP May 10 00:51:23.330539 systemd-networkd[1435]: cali17857099583: Gained carrier May 10 00:51:23.334679 (udev-worker)[6248]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:23.339921 systemd[1]: Started session-20.scope. May 10 00:51:23.341251 systemd-logind[1758]: New session 20 of user core. May 10 00:51:23.358000 audit[6309]: USER_START pid=6309 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.361000 audit[6316]: CRED_ACQ pid=6316 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:22.929 [INFO][6290] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0 calico-kube-controllers-6c4954c4f- calico-system 22273003-f71b-440f-9dce-a1be7f04b090 1275 0 2025-05-10 00:51:22 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6c4954c4f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-21-73 calico-kube-controllers-6c4954c4f-w6kq8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali17857099583 [] []}} ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:22.929 [INFO][6290] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.211 [INFO][6303] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" HandleID="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.236 [INFO][6303] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" HandleID="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c4cd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-21-73", "pod":"calico-kube-controllers-6c4954c4f-w6kq8", "timestamp":"2025-05-10 00:51:23.211021781 +0000 UTC"}, Hostname:"ip-172-31-21-73", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.236 [INFO][6303] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.236 [INFO][6303] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.236 [INFO][6303] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-21-73' May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.245 [INFO][6303] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.268 [INFO][6303] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.275 [INFO][6303] ipam/ipam.go 489: Trying affinity for 192.168.51.192/26 host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.278 [INFO][6303] ipam/ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.281 [INFO][6303] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.281 [INFO][6303] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.283 [INFO][6303] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8 May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.294 [INFO][6303] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.313 [INFO][6303] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.51.200/26] block=192.168.51.192/26 handle="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.313 [INFO][6303] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.200/26] handle="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" host="ip-172-31-21-73" May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.313 [INFO][6303] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:23.364099 env[1773]: 2025-05-10 00:51:23.314 [INFO][6303] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.51.200/26] IPv6=[] ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" HandleID="k8s-pod-network.aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.371813 env[1773]: 2025-05-10 00:51:23.316 [INFO][6290] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0", GenerateName:"calico-kube-controllers-6c4954c4f-", Namespace:"calico-system", SelfLink:"", UID:"22273003-f71b-440f-9dce-a1be7f04b090", ResourceVersion:"1275", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c4954c4f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"", Pod:"calico-kube-controllers-6c4954c4f-w6kq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.51.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali17857099583", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:23.371813 env[1773]: 2025-05-10 00:51:23.317 [INFO][6290] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.51.200/32] ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.371813 env[1773]: 2025-05-10 00:51:23.317 [INFO][6290] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali17857099583 ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.371813 env[1773]: 2025-05-10 00:51:23.334 [INFO][6290] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.371813 env[1773]: 2025-05-10 00:51:23.335 [INFO][6290] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0", GenerateName:"calico-kube-controllers-6c4954c4f-", Namespace:"calico-system", SelfLink:"", UID:"22273003-f71b-440f-9dce-a1be7f04b090", ResourceVersion:"1275", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6c4954c4f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-21-73", ContainerID:"aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8", Pod:"calico-kube-controllers-6c4954c4f-w6kq8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.51.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali17857099583", MAC:"7a:3e:98:4e:90:21", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:23.371813 env[1773]: 2025-05-10 00:51:23.349 [INFO][6290] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8" Namespace="calico-system" Pod="calico-kube-controllers-6c4954c4f-w6kq8" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--6c4954c4f--w6kq8-eth0" May 10 00:51:23.398803 env[1773]: time="2025-05-10T00:51:23.398616988Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:23.398803 env[1773]: time="2025-05-10T00:51:23.398660303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:23.398803 env[1773]: time="2025-05-10T00:51:23.398670864Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:23.404427 env[1773]: time="2025-05-10T00:51:23.399070801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8 pid=6334 runtime=io.containerd.runc.v2 May 10 00:51:23.420843 systemd[1]: run-containerd-runc-k8s.io-aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8-runc.teN3s0.mount: Deactivated successfully. May 10 00:51:23.504654 env[1773]: time="2025-05-10T00:51:23.504610621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6c4954c4f-w6kq8,Uid:22273003-f71b-440f-9dce-a1be7f04b090,Namespace:calico-system,Attempt:0,} returns sandbox id \"aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8\"" May 10 00:51:23.585000 audit[6382]: NETFILTER_CFG table=filter:148 family=2 entries=32 op=nft_register_rule pid=6382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:23.585000 audit[6382]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffda1a6ffa0 a2=0 a3=7ffda1a6ff8c items=0 ppid=3020 pid=6382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:23.591000 audit[6382]: NETFILTER_CFG table=nat:149 family=2 entries=32 op=nft_register_chain pid=6382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:23.591000 audit[6382]: SYSCALL arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7ffda1a6ffa0 a2=0 a3=7ffda1a6ff8c items=0 ppid=3020 pid=6382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:23.640452 env[1773]: time="2025-05-10T00:51:23.640265275Z" level=info msg="CreateContainer within sandbox \"aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:51:23.670551 env[1773]: time="2025-05-10T00:51:23.670451548Z" level=info msg="CreateContainer within sandbox \"aef34bd6d69a174f75c38dacc3da6f4e0481f42639b4e9e657adae57e08cced8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f\"" May 10 00:51:23.671534 env[1773]: time="2025-05-10T00:51:23.671500227Z" level=info msg="StartContainer for \"1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f\"" May 10 00:51:23.818836 sshd[6309]: pam_unix(sshd:session): session closed for user core May 10 00:51:23.820000 audit[6309]: USER_END pid=6309 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.821000 audit[6309]: CRED_DISP pid=6309 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.824939 systemd-logind[1758]: Session 20 logged out. Waiting for processes to exit. May 10 00:51:23.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.21.73:22-139.178.89.65:41102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:23.826013 systemd[1]: sshd@19-172.31.21.73:22-139.178.89.65:41102.service: Deactivated successfully. May 10 00:51:23.827215 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:51:23.830692 systemd-logind[1758]: Removed session 20. May 10 00:51:23.898544 env[1773]: time="2025-05-10T00:51:23.898440624Z" level=info msg="StartContainer for \"1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f\" returns successfully" May 10 00:51:23.916000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.916000 audit: BPF prog-id=29 op=LOAD May 10 00:51:23.916000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2e1a6ef0 a2=98 a3=3 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.916000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:23.916000 audit: BPF prog-id=29 op=UNLOAD May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit: BPF prog-id=30 op=LOAD May 10 00:51:23.918000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2e1a6cd0 a2=74 a3=540051 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:23.918000 audit: BPF prog-id=30 op=UNLOAD May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:23.918000 audit: BPF prog-id=31 op=LOAD May 10 00:51:23.918000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2e1a6d00 a2=94 a3=2 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.918000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:23.918000 audit: BPF prog-id=31 op=UNLOAD May 10 00:51:24.041000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.041000 audit: BPF prog-id=32 op=LOAD May 10 00:51:24.041000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2e1a6bc0 a2=40 a3=1 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.042000 audit: BPF prog-id=32 op=UNLOAD May 10 00:51:24.042000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.042000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe2e1a6c90 a2=50 a3=7ffe2e1a6d70 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e1a6bd0 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e1a6c00 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e1a6b10 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e1a6c20 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e1a6c00 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e1a6bf0 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e1a6c20 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e1a6c00 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e1a6c20 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2e1a6bf0 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.053000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.053000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2e1a6c60 a2=28 a3=0 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe2e1a6a10 a2=50 a3=1 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit: BPF prog-id=33 op=LOAD May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2e1a6a10 a2=94 a3=5 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit: BPF prog-id=33 op=UNLOAD May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe2e1a6ac0 a2=50 a3=1 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe2e1a6be0 a2=4 a3=38 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { confidentiality } for pid=6429 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2e1a6c30 a2=94 a3=6 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { confidentiality } for pid=6429 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2e1a63e0 a2=94 a3=83 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { perfmon } for pid=6429 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { bpf } for pid=6429 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.054000 audit[6429]: AVC avc: denied { confidentiality } for pid=6429 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:24.054000 audit[6429]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2e1a63e0 a2=94 a3=83 items=0 ppid=6381 pid=6429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:24.056000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.056000 audit: BPF prog-id=34 op=LOAD May 10 00:51:24.056000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc918ebc0 a2=98 a3=3 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.056000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.056000 audit: BPF prog-id=34 op=UNLOAD May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit: BPF prog-id=35 op=LOAD May 10 00:51:24.057000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc918e9a0 a2=74 a3=540051 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.057000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.057000 audit: BPF prog-id=35 op=UNLOAD May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.057000 audit: BPF prog-id=36 op=LOAD May 10 00:51:24.057000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc918e9d0 a2=94 a3=2 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.057000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.057000 audit: BPF prog-id=36 op=UNLOAD May 10 00:51:24.182000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit: BPF prog-id=37 op=LOAD May 10 00:51:24.182000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc918e890 a2=40 a3=1 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.182000 audit: BPF prog-id=37 op=UNLOAD May 10 00:51:24.182000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.182000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc918e960 a2=50 a3=7ffcc918ea40 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.182000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc918e8a0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc918e8d0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc918e7e0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc918e8f0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc918e8d0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc918e8c0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc918e8f0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc918e8d0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc918e8f0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc918e8c0 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc918e930 a2=28 a3=0 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc918e6e0 a2=50 a3=1 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit: BPF prog-id=38 op=LOAD May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc918e6e0 a2=94 a3=5 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit: BPF prog-id=38 op=UNLOAD May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc918e790 a2=50 a3=1 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcc918e8b0 a2=4 a3=38 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.197000 audit[6433]: AVC avc: denied { confidentiality } for pid=6433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:24.197000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc918e900 a2=94 a3=6 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.197000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { confidentiality } for pid=6433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:24.198000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc918e0b0 a2=94 a3=83 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { bpf } for pid=6433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: AVC avc: denied { perfmon } for pid=6433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.198000 audit[6433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc918e0b0 a2=94 a3=83 items=0 ppid=6381 pid=6433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.198000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit: BPF prog-id=39 op=LOAD May 10 00:51:24.260000 audit[6436]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcda3e5d80 a2=98 a3=1999999999999999 items=0 ppid=6381 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.260000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:24.260000 audit: BPF prog-id=39 op=UNLOAD May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.260000 audit: BPF prog-id=40 op=LOAD May 10 00:51:24.260000 audit[6436]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcda3e5c60 a2=74 a3=ffff items=0 ppid=6381 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.260000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:24.261000 audit: BPF prog-id=40 op=UNLOAD May 10 00:51:24.261000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { perfmon } for pid=6436 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit[6436]: AVC avc: denied { bpf } for pid=6436 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.261000 audit: BPF prog-id=41 op=LOAD May 10 00:51:24.261000 audit[6436]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcda3e5ca0 a2=40 a3=7ffcda3e5e80 items=0 ppid=6381 pid=6436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.261000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:24.262000 audit: BPF prog-id=41 op=UNLOAD May 10 00:51:24.703595 systemd-networkd[1435]: cali17857099583: Gained IPv6LL May 10 00:51:24.717045 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804-rootfs.mount: Deactivated successfully. May 10 00:51:24.718575 env[1773]: time="2025-05-10T00:51:24.717140184Z" level=info msg="shim disconnected" id=88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804 May 10 00:51:24.718575 env[1773]: time="2025-05-10T00:51:24.717190804Z" level=warning msg="cleaning up after shim disconnected" id=88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804 namespace=k8s.io May 10 00:51:24.718575 env[1773]: time="2025-05-10T00:51:24.717301921Z" level=info msg="cleaning up dead shim" May 10 00:51:24.727327 env[1773]: time="2025-05-10T00:51:24.727277470Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6474 runtime=io.containerd.runc.v2\n" May 10 00:51:24.750480 env[1773]: time="2025-05-10T00:51:24.748960397Z" level=info msg="StopContainer for \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\" returns successfully" May 10 00:51:24.770654 env[1773]: time="2025-05-10T00:51:24.770619318Z" level=info msg="StopPodSandbox for \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\"" May 10 00:51:24.770935 env[1773]: time="2025-05-10T00:51:24.770909117Z" level=info msg="Container to stop \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:24.774103 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a-shm.mount: Deactivated successfully. May 10 00:51:24.856119 systemd[1]: run-containerd-runc-k8s.io-1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f-runc.U2qwWu.mount: Deactivated successfully. May 10 00:51:24.864180 env[1773]: time="2025-05-10T00:51:24.864129869Z" level=info msg="shim disconnected" id=8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a May 10 00:51:24.864180 env[1773]: time="2025-05-10T00:51:24.864180233Z" level=warning msg="cleaning up after shim disconnected" id=8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a namespace=k8s.io May 10 00:51:24.864437 env[1773]: time="2025-05-10T00:51:24.864192246Z" level=info msg="cleaning up dead shim" May 10 00:51:24.881648 env[1773]: time="2025-05-10T00:51:24.881593964Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6522 runtime=io.containerd.runc.v2\n" May 10 00:51:24.901676 env[1773]: time="2025-05-10T00:51:24.901630129Z" level=info msg="TearDown network for sandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" successfully" May 10 00:51:24.902299 env[1773]: time="2025-05-10T00:51:24.902264831Z" level=info msg="StopPodSandbox for \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" returns successfully" May 10 00:51:24.947342 kubelet[2789]: I0510 00:51:24.930348 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6c4954c4f-w6kq8" podStartSLOduration=2.9303127030000002 podStartE2EDuration="2.930312703s" podCreationTimestamp="2025-05-10 00:51:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:24.821847223 +0000 UTC m=+90.255175607" watchObservedRunningTime="2025-05-10 00:51:24.930312703 +0000 UTC m=+90.363641091" May 10 00:51:24.954000 audit[6543]: NETFILTER_CFG table=filter:150 family=2 entries=32 op=nft_register_rule pid=6543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:24.954000 audit[6543]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe732d0f90 a2=0 a3=7ffe732d0f7c items=0 ppid=3020 pid=6543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:24.960000 audit[6543]: NETFILTER_CFG table=nat:151 family=2 entries=30 op=nft_register_rule pid=6543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:24.960000 audit[6543]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe732d0f90 a2=0 a3=0 items=0 ppid=3020 pid=6543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:24.994179 kubelet[2789]: I0510 00:51:24.994147 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-nwbg4\" (UniqueName: \"kubernetes.io/projected/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-kube-api-access-nwbg4\") pod \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\" (UID: \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\") " May 10 00:51:24.994395 kubelet[2789]: I0510 00:51:24.994383 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-typha-certs\") pod \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\" (UID: \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\") " May 10 00:51:24.994532 kubelet[2789]: I0510 00:51:24.994520 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-tigera-ca-bundle\") pod \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\" (UID: \"d4a2f5b2-0835-4e13-bc5e-0846ca5a453f\") " May 10 00:51:25.008827 kubelet[2789]: I0510 00:51:25.008791 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" (UID: "d4a2f5b2-0835-4e13-bc5e-0846ca5a453f"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:51:25.012644 kubelet[2789]: I0510 00:51:25.012593 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-kube-api-access-nwbg4" (OuterVolumeSpecName: "kube-api-access-nwbg4") pod "d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" (UID: "d4a2f5b2-0835-4e13-bc5e-0846ca5a453f"). InnerVolumeSpecName "kube-api-access-nwbg4". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:51:25.016199 kubelet[2789]: I0510 00:51:25.016166 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" (UID: "d4a2f5b2-0835-4e13-bc5e-0846ca5a453f"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:51:25.095517 kubelet[2789]: I0510 00:51:25.095408 2789 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-typha-certs\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:25.095517 kubelet[2789]: I0510 00:51:25.095440 2789 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-tigera-ca-bundle\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:25.095517 kubelet[2789]: I0510 00:51:25.095450 2789 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-nwbg4\" (UniqueName: \"kubernetes.io/projected/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f-kube-api-access-nwbg4\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:25.402802 systemd[1]: var-lib-kubelet-pods-d4a2f5b2\x2d0835\x2d4e13\x2dbc5e\x2d0846ca5a453f-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 10 00:51:25.403194 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a-rootfs.mount: Deactivated successfully. May 10 00:51:25.403298 systemd[1]: var-lib-kubelet-pods-d4a2f5b2\x2d0835\x2d4e13\x2dbc5e\x2d0846ca5a453f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dnwbg4.mount: Deactivated successfully. May 10 00:51:25.403399 systemd[1]: var-lib-kubelet-pods-d4a2f5b2\x2d0835\x2d4e13\x2dbc5e\x2d0846ca5a453f-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 10 00:51:25.795824 kubelet[2789]: I0510 00:51:25.795712 2789 scope.go:117] "RemoveContainer" containerID="88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804" May 10 00:51:25.807324 env[1773]: time="2025-05-10T00:51:25.807244103Z" level=info msg="RemoveContainer for \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\"" May 10 00:51:25.817468 env[1773]: time="2025-05-10T00:51:25.814889666Z" level=info msg="RemoveContainer for \"88dae2dfcaa939242a18d7cb24792208fda4f8e11a90330fc9e41fa73e843804\" returns successfully" May 10 00:51:26.834033 systemd[1]: run-containerd-runc-k8s.io-1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f-runc.JUsiFj.mount: Deactivated successfully. May 10 00:51:26.891725 kubelet[2789]: I0510 00:51:26.891684 2789 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" path="/var/lib/kubelet/pods/d4a2f5b2-0835-4e13-bc5e-0846ca5a453f/volumes" May 10 00:51:28.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.73:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:28.842004 systemd[1]: Started sshd@20-172.31.21.73:22-139.178.89.65:51964.service. May 10 00:51:28.843032 kernel: kauditd_printk_skb: 382 callbacks suppressed May 10 00:51:28.844095 kernel: audit: type=1130 audit(1746838288.841:630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.73:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:29.064000 audit[6648]: USER_ACCT pid=6648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.070098 kernel: audit: type=1101 audit(1746838289.064:631): pid=6648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.070151 sshd[6648]: Accepted publickey for core from 139.178.89.65 port 51964 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:29.069000 audit[6648]: CRED_ACQ pid=6648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.075535 kernel: audit: type=1103 audit(1746838289.069:632): pid=6648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.075640 kernel: audit: type=1006 audit(1746838289.069:633): pid=6648 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 10 00:51:29.081055 kernel: audit: type=1300 audit(1746838289.069:633): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdd87ac00 a2=3 a3=0 items=0 ppid=1 pid=6648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.069000 audit[6648]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdd87ac00 a2=3 a3=0 items=0 ppid=1 pid=6648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:29.076894 sshd[6648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:29.083539 kernel: audit: type=1327 audit(1746838289.069:633): proctitle=737368643A20636F7265205B707269765D May 10 00:51:29.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:29.088159 systemd-logind[1758]: New session 21 of user core. May 10 00:51:29.089427 systemd[1]: Started session-21.scope. May 10 00:51:29.096000 audit[6648]: USER_START pid=6648 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.101000 audit[6657]: CRED_ACQ pid=6657 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.105874 kernel: audit: type=1105 audit(1746838289.096:634): pid=6648 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.105985 kernel: audit: type=1103 audit(1746838289.101:635): pid=6657 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.475018 sshd[6648]: pam_unix(sshd:session): session closed for user core May 10 00:51:29.476000 audit[6648]: USER_END pid=6648 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.489837 kernel: audit: type=1106 audit(1746838289.476:636): pid=6648 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.489913 kernel: audit: type=1104 audit(1746838289.476:637): pid=6648 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.476000 audit[6648]: CRED_DISP pid=6648 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.478634 systemd-logind[1758]: Session 21 logged out. Waiting for processes to exit. May 10 00:51:29.481154 systemd[1]: sshd@20-172.31.21.73:22-139.178.89.65:51964.service: Deactivated successfully. May 10 00:51:29.481941 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:51:29.484989 systemd-logind[1758]: Removed session 21. May 10 00:51:29.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.21.73:22-139.178.89.65:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:33.558000 audit[6739]: NETFILTER_CFG table=filter:152 family=2 entries=20 op=nft_register_rule pid=6739 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:33.558000 audit[6739]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde5715990 a2=0 a3=7ffde571597c items=0 ppid=3020 pid=6739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:33.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:33.564000 audit[6739]: NETFILTER_CFG table=nat:153 family=2 entries=106 op=nft_register_chain pid=6739 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:33.564000 audit[6739]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffde5715990 a2=0 a3=7ffde571597c items=0 ppid=3020 pid=6739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:33.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:34.510583 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:51:34.510718 kernel: audit: type=1130 audit(1746838294.500:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.73:22-139.178.89.65:51970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:34.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.73:22-139.178.89.65:51970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:34.500304 systemd[1]: Started sshd@21-172.31.21.73:22-139.178.89.65:51970.service. May 10 00:51:34.668000 audit[6762]: USER_ACCT pid=6762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.677123 sshd[6762]: Accepted publickey for core from 139.178.89.65 port 51970 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:34.684067 kernel: audit: type=1101 audit(1746838294.668:642): pid=6762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.684139 kernel: audit: type=1103 audit(1746838294.676:643): pid=6762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.676000 audit[6762]: CRED_ACQ pid=6762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.677867 sshd[6762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:34.676000 audit[6762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4396e580 a2=3 a3=0 items=0 ppid=1 pid=6762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:34.689509 systemd[1]: Started session-22.scope. May 10 00:51:34.690731 systemd-logind[1758]: New session 22 of user core. May 10 00:51:34.696059 kernel: audit: type=1006 audit(1746838294.676:644): pid=6762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 10 00:51:34.696142 kernel: audit: type=1300 audit(1746838294.676:644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4396e580 a2=3 a3=0 items=0 ppid=1 pid=6762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:34.676000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:34.697000 audit[6762]: USER_START pid=6762 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.711634 kernel: audit: type=1327 audit(1746838294.676:644): proctitle=737368643A20636F7265205B707269765D May 10 00:51:34.711752 kernel: audit: type=1105 audit(1746838294.697:645): pid=6762 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.711776 kernel: audit: type=1103 audit(1746838294.699:646): pid=6765 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.699000 audit[6765]: CRED_ACQ pid=6765 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.918598 sshd[6762]: pam_unix(sshd:session): session closed for user core May 10 00:51:34.920000 audit[6762]: USER_END pid=6762 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.922689 systemd[1]: sshd@21-172.31.21.73:22-139.178.89.65:51970.service: Deactivated successfully. May 10 00:51:34.923480 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:51:34.920000 audit[6762]: CRED_DISP pid=6762 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.929822 kernel: audit: type=1106 audit(1746838294.920:647): pid=6762 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.929881 kernel: audit: type=1104 audit(1746838294.920:648): pid=6762 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.933982 systemd-logind[1758]: Session 22 logged out. Waiting for processes to exit. May 10 00:51:34.935031 systemd-logind[1758]: Removed session 22. May 10 00:51:34.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.21.73:22-139.178.89.65:51970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:39.942672 systemd[1]: Started sshd@22-172.31.21.73:22-139.178.89.65:54924.service. May 10 00:51:39.951403 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:39.951544 kernel: audit: type=1130 audit(1746838299.943:650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.73:22-139.178.89.65:54924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:39.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.73:22-139.178.89.65:54924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:40.151000 audit[6866]: USER_ACCT pid=6866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.154867 sshd[6866]: Accepted publickey for core from 139.178.89.65 port 54924 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:40.161530 kernel: audit: type=1101 audit(1746838300.151:651): pid=6866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.162234 kernel: audit: type=1103 audit(1746838300.160:652): pid=6866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.160000 audit[6866]: CRED_ACQ pid=6866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.163624 sshd[6866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:40.160000 audit[6866]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd590b1d30 a2=3 a3=0 items=0 ppid=1 pid=6866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:40.181890 kernel: audit: type=1006 audit(1746838300.160:653): pid=6866 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:51:40.182015 kernel: audit: type=1300 audit(1746838300.160:653): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd590b1d30 a2=3 a3=0 items=0 ppid=1 pid=6866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:40.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:40.191057 kernel: audit: type=1327 audit(1746838300.160:653): proctitle=737368643A20636F7265205B707269765D May 10 00:51:40.189215 systemd[1]: Started session-23.scope. May 10 00:51:40.191327 systemd-logind[1758]: New session 23 of user core. May 10 00:51:40.198000 audit[6866]: USER_START pid=6866 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.208343 kernel: audit: type=1105 audit(1746838300.198:654): pid=6866 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.207000 audit[6875]: CRED_ACQ pid=6875 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.216523 kernel: audit: type=1103 audit(1746838300.207:655): pid=6875 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.563324 sshd[6866]: pam_unix(sshd:session): session closed for user core May 10 00:51:40.564000 audit[6866]: USER_END pid=6866 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.566951 systemd[1]: sshd@22-172.31.21.73:22-139.178.89.65:54924.service: Deactivated successfully. May 10 00:51:40.568454 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:51:40.569115 systemd-logind[1758]: Session 23 logged out. Waiting for processes to exit. May 10 00:51:40.570162 systemd-logind[1758]: Removed session 23. May 10 00:51:40.564000 audit[6866]: CRED_DISP pid=6866 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.579376 kernel: audit: type=1106 audit(1746838300.564:656): pid=6866 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.579511 kernel: audit: type=1104 audit(1746838300.564:657): pid=6866 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:40.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.21.73:22-139.178.89.65:54924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:41.855433 systemd[1]: run-containerd-runc-k8s.io-af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334-runc.kyvXJg.mount: Deactivated successfully. May 10 00:51:45.589278 systemd[1]: Started sshd@23-172.31.21.73:22-139.178.89.65:54930.service. May 10 00:51:45.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.73:22-139.178.89.65:54930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:45.593895 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:45.594024 kernel: audit: type=1130 audit(1746838305.590:659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.73:22-139.178.89.65:54930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:45.768000 audit[6995]: USER_ACCT pid=6995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.773606 sshd[6995]: Accepted publickey for core from 139.178.89.65 port 54930 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:45.776588 kernel: audit: type=1101 audit(1746838305.768:660): pid=6995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.776690 kernel: audit: type=1103 audit(1746838305.775:661): pid=6995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.775000 audit[6995]: CRED_ACQ pid=6995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.777879 sshd[6995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:45.782910 systemd[1]: Started session-24.scope. May 10 00:51:45.784316 systemd-logind[1758]: New session 24 of user core. May 10 00:51:45.791547 kernel: audit: type=1006 audit(1746838305.776:662): pid=6995 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:51:45.776000 audit[6995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8d8d810 a2=3 a3=0 items=0 ppid=1 pid=6995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:45.801689 kernel: audit: type=1300 audit(1746838305.776:662): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8d8d810 a2=3 a3=0 items=0 ppid=1 pid=6995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:45.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:45.812552 kernel: audit: type=1327 audit(1746838305.776:662): proctitle=737368643A20636F7265205B707269765D May 10 00:51:45.790000 audit[6995]: USER_START pid=6995 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.791000 audit[6999]: CRED_ACQ pid=6999 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.827340 kernel: audit: type=1105 audit(1746838305.790:663): pid=6995 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:45.827460 kernel: audit: type=1103 audit(1746838305.791:664): pid=6999 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:46.120253 sshd[6995]: pam_unix(sshd:session): session closed for user core May 10 00:51:46.120000 audit[6995]: USER_END pid=6995 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:46.122927 systemd[1]: sshd@23-172.31.21.73:22-139.178.89.65:54930.service: Deactivated successfully. May 10 00:51:46.123735 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:51:46.130528 kernel: audit: type=1106 audit(1746838306.120:665): pid=6995 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:46.130530 systemd-logind[1758]: Session 24 logged out. Waiting for processes to exit. May 10 00:51:46.121000 audit[6995]: CRED_DISP pid=6995 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:46.137879 kernel: audit: type=1104 audit(1746838306.121:666): pid=6995 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:46.140641 systemd-logind[1758]: Removed session 24. May 10 00:51:46.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.21.73:22-139.178.89.65:54930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:51.145173 systemd[1]: Started sshd@24-172.31.21.73:22-139.178.89.65:42636.service. May 10 00:51:51.153784 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:51.153840 kernel: audit: type=1130 audit(1746838311.144:668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.73:22-139.178.89.65:42636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:51.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.73:22-139.178.89.65:42636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:51.326000 audit[7096]: USER_ACCT pid=7096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.334969 sshd[7096]: Accepted publickey for core from 139.178.89.65 port 42636 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:51.334000 audit[7096]: CRED_ACQ pid=7096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.335804 sshd[7096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:51.341864 kernel: audit: type=1101 audit(1746838311.326:669): pid=7096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.341957 kernel: audit: type=1103 audit(1746838311.334:670): pid=7096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.341991 kernel: audit: type=1006 audit(1746838311.334:671): pid=7096 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:51:51.348223 kernel: audit: type=1300 audit(1746838311.334:671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2c4a9d0 a2=3 a3=0 items=0 ppid=1 pid=7096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:51.334000 audit[7096]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2c4a9d0 a2=3 a3=0 items=0 ppid=1 pid=7096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:51.350089 systemd[1]: Started session-25.scope. May 10 00:51:51.350701 systemd-logind[1758]: New session 25 of user core. May 10 00:51:51.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:51.357523 kernel: audit: type=1327 audit(1746838311.334:671): proctitle=737368643A20636F7265205B707269765D May 10 00:51:51.357000 audit[7096]: USER_START pid=7096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.365730 kernel: audit: type=1105 audit(1746838311.357:672): pid=7096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.365802 kernel: audit: type=1103 audit(1746838311.364:673): pid=7106 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.364000 audit[7106]: CRED_ACQ pid=7106 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.524788 systemd[1]: run-containerd-runc-k8s.io-af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334-runc.gu0gcB.mount: Deactivated successfully. May 10 00:51:51.649222 env[1773]: time="2025-05-10T00:51:51.649184163Z" level=info msg="StopContainer for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" with timeout 5 (s)" May 10 00:51:51.650091 env[1773]: time="2025-05-10T00:51:51.650058404Z" level=info msg="Stop container \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" with signal terminated" May 10 00:51:51.705599 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334-rootfs.mount: Deactivated successfully. May 10 00:51:51.707805 env[1773]: time="2025-05-10T00:51:51.707750696Z" level=info msg="shim disconnected" id=af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334 May 10 00:51:51.708040 env[1773]: time="2025-05-10T00:51:51.707809790Z" level=warning msg="cleaning up after shim disconnected" id=af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334 namespace=k8s.io May 10 00:51:51.708040 env[1773]: time="2025-05-10T00:51:51.707821734Z" level=info msg="cleaning up dead shim" May 10 00:51:51.719425 env[1773]: time="2025-05-10T00:51:51.719376466Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7158 runtime=io.containerd.runc.v2\n" May 10 00:51:51.740382 env[1773]: time="2025-05-10T00:51:51.740338501Z" level=info msg="StopContainer for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" returns successfully" May 10 00:51:51.741573 env[1773]: time="2025-05-10T00:51:51.740864541Z" level=info msg="StopPodSandbox for \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\"" May 10 00:51:51.741573 env[1773]: time="2025-05-10T00:51:51.740925962Z" level=info msg="Container to stop \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:51.741573 env[1773]: time="2025-05-10T00:51:51.740939282Z" level=info msg="Container to stop \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:51.741573 env[1773]: time="2025-05-10T00:51:51.740950195Z" level=info msg="Container to stop \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:51.744699 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251-shm.mount: Deactivated successfully. May 10 00:51:51.784684 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251-rootfs.mount: Deactivated successfully. May 10 00:51:51.790444 env[1773]: time="2025-05-10T00:51:51.790393255Z" level=info msg="shim disconnected" id=0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251 May 10 00:51:51.791427 env[1773]: time="2025-05-10T00:51:51.791398068Z" level=warning msg="cleaning up after shim disconnected" id=0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251 namespace=k8s.io May 10 00:51:51.791613 env[1773]: time="2025-05-10T00:51:51.791595414Z" level=info msg="cleaning up dead shim" May 10 00:51:51.805103 env[1773]: time="2025-05-10T00:51:51.805042694Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7194 runtime=io.containerd.runc.v2\n" May 10 00:51:51.821422 env[1773]: time="2025-05-10T00:51:51.821137007Z" level=info msg="TearDown network for sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" successfully" May 10 00:51:51.821422 env[1773]: time="2025-05-10T00:51:51.821170393Z" level=info msg="StopPodSandbox for \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" returns successfully" May 10 00:51:51.853911 sshd[7096]: pam_unix(sshd:session): session closed for user core May 10 00:51:51.855000 audit[7096]: USER_END pid=7096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.857950 systemd[1]: sshd@24-172.31.21.73:22-139.178.89.65:42636.service: Deactivated successfully. May 10 00:51:51.864514 kernel: audit: type=1106 audit(1746838311.855:674): pid=7096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.858727 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:51:51.855000 audit[7096]: CRED_DISP pid=7096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.865426 systemd-logind[1758]: Session 25 logged out. Waiting for processes to exit. May 10 00:51:51.868046 systemd-logind[1758]: Removed session 25. May 10 00:51:51.872509 kernel: audit: type=1104 audit(1746838311.855:675): pid=7096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:51.875517 kubelet[2789]: I0510 00:51:51.875475 2789 scope.go:117] "RemoveContainer" containerID="af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334" May 10 00:51:51.877378 env[1773]: time="2025-05-10T00:51:51.877347272Z" level=info msg="RemoveContainer for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\"" May 10 00:51:51.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.21.73:22-139.178.89.65:42636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:51.884686 env[1773]: time="2025-05-10T00:51:51.884648697Z" level=info msg="RemoveContainer for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" returns successfully" May 10 00:51:51.885079 kubelet[2789]: I0510 00:51:51.885060 2789 scope.go:117] "RemoveContainer" containerID="9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e" May 10 00:51:51.888692 env[1773]: time="2025-05-10T00:51:51.888652500Z" level=info msg="RemoveContainer for \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\"" May 10 00:51:51.892535 kubelet[2789]: I0510 00:51:51.892472 2789 topology_manager.go:215] "Topology Admit Handler" podUID="aac6d0de-d3a4-40d8-9119-3dc73469b1b4" podNamespace="calico-system" podName="calico-node-42znv" May 10 00:51:51.896514 kubelet[2789]: E0510 00:51:51.896463 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" containerName="calico-typha" May 10 00:51:51.896716 kubelet[2789]: E0510 00:51:51.896701 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="29901ea3-2927-49f5-9332-eceb7ed83f0e" containerName="flexvol-driver" May 10 00:51:51.896812 kubelet[2789]: E0510 00:51:51.896800 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="29901ea3-2927-49f5-9332-eceb7ed83f0e" containerName="install-cni" May 10 00:51:51.896901 kubelet[2789]: E0510 00:51:51.896889 2789 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="29901ea3-2927-49f5-9332-eceb7ed83f0e" containerName="calico-node" May 10 00:51:51.898217 kubelet[2789]: I0510 00:51:51.898189 2789 memory_manager.go:354] "RemoveStaleState removing state" podUID="d4a2f5b2-0835-4e13-bc5e-0846ca5a453f" containerName="calico-typha" May 10 00:51:51.898217 kubelet[2789]: I0510 00:51:51.898219 2789 memory_manager.go:354] "RemoveStaleState removing state" podUID="29901ea3-2927-49f5-9332-eceb7ed83f0e" containerName="calico-node" May 10 00:51:51.900245 env[1773]: time="2025-05-10T00:51:51.900203432Z" level=info msg="RemoveContainer for \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\" returns successfully" May 10 00:51:51.900600 kubelet[2789]: I0510 00:51:51.900577 2789 scope.go:117] "RemoveContainer" containerID="e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53" May 10 00:51:51.903425 env[1773]: time="2025-05-10T00:51:51.903389536Z" level=info msg="RemoveContainer for \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\"" May 10 00:51:51.912147 kubelet[2789]: I0510 00:51:51.912100 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-hzqmf\" (UniqueName: \"kubernetes.io/projected/29901ea3-2927-49f5-9332-eceb7ed83f0e-kube-api-access-hzqmf\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.912402 kubelet[2789]: I0510 00:51:51.912376 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-lib-calico\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.914272 env[1773]: time="2025-05-10T00:51:51.914141844Z" level=info msg="RemoveContainer for \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\" returns successfully" May 10 00:51:51.914460 kubelet[2789]: I0510 00:51:51.914441 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-bin-dir\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.914602 kubelet[2789]: I0510 00:51:51.914588 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-flexvol-driver-host\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.914702 kubelet[2789]: I0510 00:51:51.914690 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-log-dir\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.914795 kubelet[2789]: I0510 00:51:51.914783 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-xtables-lock\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.914892 kubelet[2789]: I0510 00:51:51.914882 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-policysync\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.914976 kubelet[2789]: I0510 00:51:51.914965 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-net-dir\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.915059 kubelet[2789]: I0510 00:51:51.915045 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-run-calico\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.915156 kubelet[2789]: I0510 00:51:51.915144 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/29901ea3-2927-49f5-9332-eceb7ed83f0e-node-certs\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.915245 kubelet[2789]: I0510 00:51:51.915235 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/29901ea3-2927-49f5-9332-eceb7ed83f0e-tigera-ca-bundle\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.915342 kubelet[2789]: I0510 00:51:51.915332 2789 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-lib-modules\") pod \"29901ea3-2927-49f5-9332-eceb7ed83f0e\" (UID: \"29901ea3-2927-49f5-9332-eceb7ed83f0e\") " May 10 00:51:51.917425 kubelet[2789]: I0510 00:51:51.917402 2789 scope.go:117] "RemoveContainer" containerID="af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334" May 10 00:51:51.917980 env[1773]: time="2025-05-10T00:51:51.917917855Z" level=error msg="ContainerStatus for \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\": not found" May 10 00:51:51.919839 kubelet[2789]: I0510 00:51:51.919811 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.920094 kubelet[2789]: I0510 00:51:51.919801 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.920229 kubelet[2789]: I0510 00:51:51.920210 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.920344 kubelet[2789]: I0510 00:51:51.920329 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-policysync" (OuterVolumeSpecName: "policysync") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.927249 kubelet[2789]: I0510 00:51:51.926536 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.927249 kubelet[2789]: I0510 00:51:51.926599 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.927688 kubelet[2789]: E0510 00:51:51.927644 2789 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\": not found" containerID="af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334" May 10 00:51:51.927857 kubelet[2789]: I0510 00:51:51.927833 2789 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334"} err="failed to get container status \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\": rpc error: code = NotFound desc = an error occurred when try to find container \"af8b308c36226da30d496e8bd22595df0911b0a7a7441af78132c91528704334\": not found" May 10 00:51:51.927949 kubelet[2789]: I0510 00:51:51.927935 2789 scope.go:117] "RemoveContainer" containerID="9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e" May 10 00:51:51.928701 env[1773]: time="2025-05-10T00:51:51.928593791Z" level=error msg="ContainerStatus for \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\": not found" May 10 00:51:51.937510 kubelet[2789]: I0510 00:51:51.937445 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/29901ea3-2927-49f5-9332-eceb7ed83f0e-kube-api-access-hzqmf" (OuterVolumeSpecName: "kube-api-access-hzqmf") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "kube-api-access-hzqmf". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:51:51.937734 kubelet[2789]: I0510 00:51:51.937713 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.937854 kubelet[2789]: I0510 00:51:51.937840 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.938036 kubelet[2789]: I0510 00:51:51.938018 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:51:51.938245 kubelet[2789]: E0510 00:51:51.938221 2789 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\": not found" containerID="9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e" May 10 00:51:51.938402 kubelet[2789]: I0510 00:51:51.938377 2789 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e"} err="failed to get container status \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\": rpc error: code = NotFound desc = an error occurred when try to find container \"9e30ebe156fb154e754d99d3d418df7b092aa913816c7942ac591313feea637e\": not found" May 10 00:51:51.938504 kubelet[2789]: I0510 00:51:51.938471 2789 scope.go:117] "RemoveContainer" containerID="e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53" May 10 00:51:51.940831 env[1773]: time="2025-05-10T00:51:51.940755016Z" level=error msg="ContainerStatus for \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\": not found" May 10 00:51:51.942017 kubelet[2789]: E0510 00:51:51.941990 2789 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\": not found" containerID="e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53" May 10 00:51:51.942157 kubelet[2789]: I0510 00:51:51.942136 2789 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53"} err="failed to get container status \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\": rpc error: code = NotFound desc = an error occurred when try to find container \"e80022228ca0c507ca16c6191932bdbc34ffc6f9b9618116713322396f7a6b53\": not found" May 10 00:51:51.942701 kubelet[2789]: I0510 00:51:51.942667 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/29901ea3-2927-49f5-9332-eceb7ed83f0e-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:51:51.943396 kubelet[2789]: I0510 00:51:51.943373 2789 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/29901ea3-2927-49f5-9332-eceb7ed83f0e-node-certs" (OuterVolumeSpecName: "node-certs") pod "29901ea3-2927-49f5-9332-eceb7ed83f0e" (UID: "29901ea3-2927-49f5-9332-eceb7ed83f0e"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:51:52.015776 kubelet[2789]: I0510 00:51:52.015729 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-cni-bin-dir\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.015776 kubelet[2789]: I0510 00:51:52.015777 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-policysync\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.015776 kubelet[2789]: I0510 00:51:52.015794 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-cni-net-dir\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016155 kubelet[2789]: I0510 00:51:52.015835 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-cni-log-dir\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016155 kubelet[2789]: I0510 00:51:52.015855 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7hw7p\" (UniqueName: \"kubernetes.io/projected/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-kube-api-access-7hw7p\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016155 kubelet[2789]: I0510 00:51:52.015872 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-lib-modules\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016155 kubelet[2789]: I0510 00:51:52.015887 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-xtables-lock\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016155 kubelet[2789]: I0510 00:51:52.015942 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-var-lib-calico\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016298 kubelet[2789]: I0510 00:51:52.015967 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-var-run-calico\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016298 kubelet[2789]: I0510 00:51:52.015992 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-flexvol-driver-host\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016298 kubelet[2789]: I0510 00:51:52.016010 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-tigera-ca-bundle\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016298 kubelet[2789]: I0510 00:51:52.016025 2789 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/aac6d0de-d3a4-40d8-9119-3dc73469b1b4-node-certs\") pod \"calico-node-42znv\" (UID: \"aac6d0de-d3a4-40d8-9119-3dc73469b1b4\") " pod="calico-system/calico-node-42znv" May 10 00:51:52.016298 kubelet[2789]: I0510 00:51:52.016051 2789 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-lib-modules\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016298 kubelet[2789]: I0510 00:51:52.016062 2789 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-hzqmf\" (UniqueName: \"kubernetes.io/projected/29901ea3-2927-49f5-9332-eceb7ed83f0e-kube-api-access-hzqmf\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016075 2789 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-lib-calico\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016086 2789 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-bin-dir\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016094 2789 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-flexvol-driver-host\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016103 2789 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-policysync\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016111 2789 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-log-dir\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016118 2789 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-xtables-lock\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016127 2789 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-cni-net-dir\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016458 kubelet[2789]: I0510 00:51:52.016135 2789 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/29901ea3-2927-49f5-9332-eceb7ed83f0e-var-run-calico\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016693 kubelet[2789]: I0510 00:51:52.016142 2789 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/29901ea3-2927-49f5-9332-eceb7ed83f0e-node-certs\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.016693 kubelet[2789]: I0510 00:51:52.016150 2789 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/29901ea3-2927-49f5-9332-eceb7ed83f0e-tigera-ca-bundle\") on node \"ip-172-31-21-73\" DevicePath \"\"" May 10 00:51:52.206093 env[1773]: time="2025-05-10T00:51:52.206040408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-42znv,Uid:aac6d0de-d3a4-40d8-9119-3dc73469b1b4,Namespace:calico-system,Attempt:0,}" May 10 00:51:52.228304 env[1773]: time="2025-05-10T00:51:52.228223697Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:52.228304 env[1773]: time="2025-05-10T00:51:52.228263103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:52.228304 env[1773]: time="2025-05-10T00:51:52.228274303Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:52.228575 env[1773]: time="2025-05-10T00:51:52.228424693Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1 pid=7222 runtime=io.containerd.runc.v2 May 10 00:51:52.272268 env[1773]: time="2025-05-10T00:51:52.272216542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-42znv,Uid:aac6d0de-d3a4-40d8-9119-3dc73469b1b4,Namespace:calico-system,Attempt:0,} returns sandbox id \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\"" May 10 00:51:52.275779 env[1773]: time="2025-05-10T00:51:52.275731520Z" level=info msg="CreateContainer within sandbox \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:51:52.307863 env[1773]: time="2025-05-10T00:51:52.307705213Z" level=info msg="CreateContainer within sandbox \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8b5807a4fdb2fcb0f9b88fa2cf6647cdda7ddbab582127bc779b253c7714dee5\"" May 10 00:51:52.310757 env[1773]: time="2025-05-10T00:51:52.310216963Z" level=info msg="StartContainer for \"8b5807a4fdb2fcb0f9b88fa2cf6647cdda7ddbab582127bc779b253c7714dee5\"" May 10 00:51:52.387439 env[1773]: time="2025-05-10T00:51:52.387391946Z" level=info msg="StartContainer for \"8b5807a4fdb2fcb0f9b88fa2cf6647cdda7ddbab582127bc779b253c7714dee5\" returns successfully" May 10 00:51:52.525401 systemd[1]: var-lib-kubelet-pods-29901ea3\x2d2927\x2d49f5\x2d9332\x2deceb7ed83f0e-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 00:51:52.525610 systemd[1]: var-lib-kubelet-pods-29901ea3\x2d2927\x2d49f5\x2d9332\x2deceb7ed83f0e-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dhzqmf.mount: Deactivated successfully. May 10 00:51:52.525710 systemd[1]: var-lib-kubelet-pods-29901ea3\x2d2927\x2d49f5\x2d9332\x2deceb7ed83f0e-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 00:51:52.541093 env[1773]: time="2025-05-10T00:51:52.541047552Z" level=info msg="shim disconnected" id=8b5807a4fdb2fcb0f9b88fa2cf6647cdda7ddbab582127bc779b253c7714dee5 May 10 00:51:52.541093 env[1773]: time="2025-05-10T00:51:52.541087301Z" level=warning msg="cleaning up after shim disconnected" id=8b5807a4fdb2fcb0f9b88fa2cf6647cdda7ddbab582127bc779b253c7714dee5 namespace=k8s.io May 10 00:51:52.541093 env[1773]: time="2025-05-10T00:51:52.541096493Z" level=info msg="cleaning up dead shim" May 10 00:51:52.549214 env[1773]: time="2025-05-10T00:51:52.549170552Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7298 runtime=io.containerd.runc.v2\n" May 10 00:51:52.784164 systemd[1]: run-containerd-runc-k8s.io-1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f-runc.GW7UpK.mount: Deactivated successfully. May 10 00:51:52.850673 kubelet[2789]: I0510 00:51:52.850644 2789 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="29901ea3-2927-49f5-9332-eceb7ed83f0e" path="/var/lib/kubelet/pods/29901ea3-2927-49f5-9332-eceb7ed83f0e/volumes" May 10 00:51:52.896086 env[1773]: time="2025-05-10T00:51:52.896046798Z" level=info msg="CreateContainer within sandbox \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:51:52.931693 env[1773]: time="2025-05-10T00:51:52.931638023Z" level=info msg="CreateContainer within sandbox \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"49688d62a1b8144b5b88a10d1f5e30dc90ad6d5518f986fd86fb82d0122fea82\"" May 10 00:51:52.933851 env[1773]: time="2025-05-10T00:51:52.932603877Z" level=info msg="StartContainer for \"49688d62a1b8144b5b88a10d1f5e30dc90ad6d5518f986fd86fb82d0122fea82\"" May 10 00:51:52.994825 env[1773]: time="2025-05-10T00:51:52.994790145Z" level=info msg="StartContainer for \"49688d62a1b8144b5b88a10d1f5e30dc90ad6d5518f986fd86fb82d0122fea82\" returns successfully" May 10 00:51:53.522915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2219859052.mount: Deactivated successfully. May 10 00:51:55.027259 env[1773]: time="2025-05-10T00:51:55.026672498Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 10 00:51:55.064936 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-49688d62a1b8144b5b88a10d1f5e30dc90ad6d5518f986fd86fb82d0122fea82-rootfs.mount: Deactivated successfully. May 10 00:51:55.073134 env[1773]: time="2025-05-10T00:51:55.072883061Z" level=info msg="shim disconnected" id=49688d62a1b8144b5b88a10d1f5e30dc90ad6d5518f986fd86fb82d0122fea82 May 10 00:51:55.073134 env[1773]: time="2025-05-10T00:51:55.072931565Z" level=warning msg="cleaning up after shim disconnected" id=49688d62a1b8144b5b88a10d1f5e30dc90ad6d5518f986fd86fb82d0122fea82 namespace=k8s.io May 10 00:51:55.073134 env[1773]: time="2025-05-10T00:51:55.072941082Z" level=info msg="cleaning up dead shim" May 10 00:51:55.082964 env[1773]: time="2025-05-10T00:51:55.082917631Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7394 runtime=io.containerd.runc.v2\n" May 10 00:51:55.936260 env[1773]: time="2025-05-10T00:51:55.936218638Z" level=info msg="CreateContainer within sandbox \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:51:55.970879 env[1773]: time="2025-05-10T00:51:55.970805899Z" level=info msg="CreateContainer within sandbox \"dfd3fbae436deeb4fe88ba928ba250917eb319293e3fde2c132e42340d47a2e1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"370969d7e9b76ecce9e25e5ca8a08b7a5a9fe3d2a237451f69babdcaf82f0dc0\"" May 10 00:51:55.972511 env[1773]: time="2025-05-10T00:51:55.971546062Z" level=info msg="StartContainer for \"370969d7e9b76ecce9e25e5ca8a08b7a5a9fe3d2a237451f69babdcaf82f0dc0\"" May 10 00:51:56.035593 env[1773]: time="2025-05-10T00:51:56.035538734Z" level=info msg="StartContainer for \"370969d7e9b76ecce9e25e5ca8a08b7a5a9fe3d2a237451f69babdcaf82f0dc0\" returns successfully" May 10 00:51:56.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.73:22-139.178.89.65:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:56.880654 systemd[1]: Started sshd@25-172.31.21.73:22-139.178.89.65:47904.service. May 10 00:51:56.884740 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:56.885424 kernel: audit: type=1130 audit(1746838316.880:677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.73:22-139.178.89.65:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:56.950964 kubelet[2789]: I0510 00:51:56.949390 2789 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-42znv" podStartSLOduration=5.94128631 podStartE2EDuration="5.94128631s" podCreationTimestamp="2025-05-10 00:51:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:56.940997605 +0000 UTC m=+122.374325992" watchObservedRunningTime="2025-05-10 00:51:56.94128631 +0000 UTC m=+122.374614696" May 10 00:51:57.103000 audit[7469]: USER_ACCT pid=7469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.104870 sshd[7469]: Accepted publickey for core from 139.178.89.65 port 47904 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:57.111523 kernel: audit: type=1101 audit(1746838317.103:678): pid=7469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.111000 audit[7469]: CRED_ACQ pid=7469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.118716 sshd[7469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:57.122809 kernel: audit: type=1103 audit(1746838317.111:679): pid=7469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.122929 kernel: audit: type=1006 audit(1746838317.111:680): pid=7469 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 00:51:57.122958 kernel: audit: type=1300 audit(1746838317.111:680): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f5d28c0 a2=3 a3=0 items=0 ppid=1 pid=7469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.111000 audit[7469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f5d28c0 a2=3 a3=0 items=0 ppid=1 pid=7469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.131303 kernel: audit: type=1327 audit(1746838317.111:680): proctitle=737368643A20636F7265205B707269765D May 10 00:51:57.111000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:57.130972 systemd[1]: Started session-26.scope. May 10 00:51:57.132637 systemd-logind[1758]: New session 26 of user core. May 10 00:51:57.140000 audit[7469]: USER_START pid=7469 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.142000 audit[7472]: CRED_ACQ pid=7472 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.157358 kernel: audit: type=1105 audit(1746838317.140:681): pid=7469 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.158187 kernel: audit: type=1103 audit(1746838317.142:682): pid=7472 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:57.678000 audit[7537]: AVC avc: denied { write } for pid=7537 comm="tee" name="fd" dev="proc" ino=37860 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.678000 audit[7537]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd20b17a0a a2=241 a3=1b6 items=1 ppid=7489 pid=7537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.692983 kernel: audit: type=1400 audit(1746838317.678:683): avc: denied { write } for pid=7537 comm="tee" name="fd" dev="proc" ino=37860 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.693812 kernel: audit: type=1300 audit(1746838317.678:683): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd20b17a0a a2=241 a3=1b6 items=1 ppid=7489 pid=7537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.678000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:51:57.678000 audit: PATH item=0 name="/dev/fd/63" inode=37843 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.678000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:57.702000 audit[7548]: AVC avc: denied { write } for pid=7548 comm="tee" name="fd" dev="proc" ino=37868 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.702000 audit[7548]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc06e8a1a a2=241 a3=1b6 items=1 ppid=7497 pid=7548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.702000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:51:57.702000 audit: PATH item=0 name="/dev/fd/63" inode=37857 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:57.709000 audit[7551]: AVC avc: denied { write } for pid=7551 comm="tee" name="fd" dev="proc" ino=38054 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.709000 audit[7551]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb50e7a1c a2=241 a3=1b6 items=1 ppid=7493 pid=7551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.709000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:51:57.709000 audit: PATH item=0 name="/dev/fd/63" inode=37862 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.709000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:57.710000 audit[7535]: AVC avc: denied { write } for pid=7535 comm="tee" name="fd" dev="proc" ino=38058 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.710000 audit[7535]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe63e0da1b a2=241 a3=1b6 items=1 ppid=7498 pid=7535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.710000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:51:57.710000 audit: PATH item=0 name="/dev/fd/63" inode=38044 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.710000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:57.710000 audit[7546]: AVC avc: denied { write } for pid=7546 comm="tee" name="fd" dev="proc" ino=38060 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.710000 audit[7546]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc899a9a1a a2=241 a3=1b6 items=1 ppid=7490 pid=7546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.710000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:51:57.710000 audit: PATH item=0 name="/dev/fd/63" inode=38049 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.710000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:57.714000 audit[7544]: AVC avc: denied { write } for pid=7544 comm="tee" name="fd" dev="proc" ino=37875 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.714000 audit[7544]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd6506a1a a2=241 a3=1b6 items=1 ppid=7501 pid=7544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.714000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:51:57.714000 audit: PATH item=0 name="/dev/fd/63" inode=37854 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.714000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:57.732000 audit[7565]: AVC avc: denied { write } for pid=7565 comm="tee" name="fd" dev="proc" ino=38065 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:57.732000 audit[7565]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd1322a0b a2=241 a3=1b6 items=1 ppid=7503 pid=7565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.732000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:51:57.732000 audit: PATH item=0 name="/dev/fd/63" inode=37870 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:57.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.120505 sshd[7469]: pam_unix(sshd:session): session closed for user core May 10 00:51:58.122000 audit[7469]: USER_END pid=7469 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:58.122000 audit[7469]: CRED_DISP pid=7469 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:58.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.21.73:22-139.178.89.65:47904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:58.127312 systemd-logind[1758]: Session 26 logged out. Waiting for processes to exit. May 10 00:51:58.128029 systemd[1]: sshd@25-172.31.21.73:22-139.178.89.65:47904.service: Deactivated successfully. May 10 00:51:58.130082 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:51:58.132994 systemd-logind[1758]: Removed session 26. May 10 00:51:58.292000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.292000 audit: BPF prog-id=42 op=LOAD May 10 00:51:58.292000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd11d46310 a2=98 a3=3 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.292000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.292000 audit: BPF prog-id=42 op=UNLOAD May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit: BPF prog-id=43 op=LOAD May 10 00:51:58.296000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd11d460f0 a2=74 a3=540051 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.296000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.296000 audit: BPF prog-id=43 op=UNLOAD May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.296000 audit: BPF prog-id=44 op=LOAD May 10 00:51:58.296000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd11d46120 a2=94 a3=2 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.296000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.296000 audit: BPF prog-id=44 op=UNLOAD May 10 00:51:58.442000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit: BPF prog-id=45 op=LOAD May 10 00:51:58.442000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd11d45fe0 a2=40 a3=1 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.442000 audit: BPF prog-id=45 op=UNLOAD May 10 00:51:58.442000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.442000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd11d460b0 a2=50 a3=7ffd11d46190 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.442000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11d45ff0 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11d46020 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11d45f30 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11d46040 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11d46020 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11d46010 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11d46040 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11d46020 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11d46040 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11d46010 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.453000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.453000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11d46080 a2=28 a3=0 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.453000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd11d45e30 a2=50 a3=1 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit: BPF prog-id=46 op=LOAD May 10 00:51:58.454000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd11d45e30 a2=94 a3=5 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.454000 audit: BPF prog-id=46 op=UNLOAD May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd11d45ee0 a2=50 a3=1 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd11d46000 a2=4 a3=38 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { confidentiality } for pid=7605 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:58.454000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd11d46050 a2=94 a3=6 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.454000 audit[7605]: AVC avc: denied { confidentiality } for pid=7605 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:58.454000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd11d45800 a2=94 a3=83 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.454000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.455000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { perfmon } for pid=7605 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { bpf } for pid=7605 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.455000 audit[7605]: AVC avc: denied { confidentiality } for pid=7605 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:58.455000 audit[7605]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd11d45800 a2=94 a3=83 items=0 ppid=7506 pid=7605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.455000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:58.491000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.491000 audit: BPF prog-id=47 op=LOAD May 10 00:51:58.491000 audit[7608]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff71d13050 a2=98 a3=1999999999999999 items=0 ppid=7506 pid=7608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.491000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:58.492000 audit: BPF prog-id=47 op=UNLOAD May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit: BPF prog-id=48 op=LOAD May 10 00:51:58.492000 audit[7608]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff71d12f30 a2=74 a3=ffff items=0 ppid=7506 pid=7608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.492000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:58.492000 audit: BPF prog-id=48 op=UNLOAD May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { perfmon } for pid=7608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit[7608]: AVC avc: denied { bpf } for pid=7608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.492000 audit: BPF prog-id=49 op=LOAD May 10 00:51:58.492000 audit[7608]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff71d12f70 a2=40 a3=7fff71d13150 items=0 ppid=7506 pid=7608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.492000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:58.492000 audit: BPF prog-id=49 op=UNLOAD May 10 00:51:58.580000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.580000 audit: BPF prog-id=50 op=LOAD May 10 00:51:58.580000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe2bf1460 a2=98 a3=ffffffff items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.580000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.580000 audit: BPF prog-id=50 op=UNLOAD May 10 00:51:58.581000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.581000 audit: BPF prog-id=51 op=LOAD May 10 00:51:58.581000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe2bf1270 a2=74 a3=540051 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.581000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit: BPF prog-id=51 op=UNLOAD May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit: BPF prog-id=52 op=LOAD May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe2bf12a0 a2=94 a3=2 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit: BPF prog-id=52 op=UNLOAD May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe2bf1170 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2bf11a0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2bf10b0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe2bf11c0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe2bf11a0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe2bf1190 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe2bf11c0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2bf11a0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2bf11c0 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.582000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.582000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffe2bf1190 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.582000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffe2bf1200 a2=28 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.586000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.586000 audit: BPF prog-id=53 op=LOAD May 10 00:51:58.586000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe2bf1070 a2=40 a3=0 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.586000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.586000 audit: BPF prog-id=53 op=UNLOAD May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffe2bf1060 a2=50 a3=2800 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.588000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffe2bf1060 a2=50 a3=2800 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.588000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit: BPF prog-id=54 op=LOAD May 10 00:51:58.588000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe2bf0880 a2=94 a3=2 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.588000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.588000 audit: BPF prog-id=54 op=UNLOAD May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { perfmon } for pid=7631 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit[7631]: AVC avc: denied { bpf } for pid=7631 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.588000 audit: BPF prog-id=55 op=LOAD May 10 00:51:58.588000 audit[7631]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffe2bf0980 a2=94 a3=30 items=0 ppid=7506 pid=7631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.588000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.594000 audit: BPF prog-id=56 op=LOAD May 10 00:51:58.594000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc51508a40 a2=98 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.595000 audit: BPF prog-id=56 op=UNLOAD May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit: BPF prog-id=57 op=LOAD May 10 00:51:58.595000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc51508820 a2=74 a3=540051 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.595000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.595000 audit: BPF prog-id=57 op=UNLOAD May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.595000 audit: BPF prog-id=58 op=LOAD May 10 00:51:58.595000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc51508850 a2=94 a3=2 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.595000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.595000 audit: BPF prog-id=58 op=UNLOAD May 10 00:51:58.595794 (udev-worker)[7632]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:58.597577 (udev-worker)[7634]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:58.624527 env[1773]: time="2025-05-10T00:51:58.617358365Z" level=info msg="StopPodSandbox for \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\"" May 10 00:51:58.743000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit: BPF prog-id=59 op=LOAD May 10 00:51:58.743000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc51508710 a2=40 a3=1 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.743000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.743000 audit: BPF prog-id=59 op=UNLOAD May 10 00:51:58.743000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.743000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc515087e0 a2=50 a3=7ffc515088c0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.743000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc51508720 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc51508750 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc51508660 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc51508770 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc51508750 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc51508740 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc51508770 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc51508750 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc51508770 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc51508740 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.763000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.763000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc515087b0 a2=28 a3=0 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.763000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc51508560 a2=50 a3=1 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit: BPF prog-id=60 op=LOAD May 10 00:51:58.764000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc51508560 a2=94 a3=5 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.764000 audit: BPF prog-id=60 op=UNLOAD May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc51508610 a2=50 a3=1 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc51508730 a2=4 a3=38 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.764000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc51508780 a2=94 a3=6 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { confidentiality } for pid=7635 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:58.767000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc51507f30 a2=94 a3=83 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.767000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { perfmon } for pid=7635 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.767000 audit[7635]: AVC avc: denied { confidentiality } for pid=7635 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:58.767000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc51507f30 a2=94 a3=83 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.767000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.768000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.768000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc51509970 a2=10 a3=f1f00800 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.768000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.768000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc51509810 a2=10 a3=3 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.768000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.768000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc515097b0 a2=10 a3=3 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.768000 audit[7635]: AVC avc: denied { bpf } for pid=7635 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:58.768000 audit[7635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc515097b0 a2=10 a3=7 items=0 ppid=7506 pid=7635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.768000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:58.777000 audit: BPF prog-id=55 op=UNLOAD May 10 00:51:58.777000 audit[1425]: SYSCALL arch=c000003e syscall=47 success=yes exit=4 a0=7 a1=7fff39113e40 a2=40 a3=7fff39113f60 items=0 ppid=1 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-udevd" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.777000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-udevd" May 10 00:51:58.868000 audit[7691]: NETFILTER_CFG table=filter:154 family=2 entries=46 op=nft_register_chain pid=7691 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:58.868000 audit[7691]: SYSCALL arch=c000003e syscall=46 success=yes exit=22492 a0=3 a1=7ffc58143470 a2=0 a3=7ffc5814345c items=0 ppid=7506 pid=7691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.868000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.053 [WARNING][7658] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.056 [INFO][7658] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.056 [INFO][7658] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" iface="eth0" netns="" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.056 [INFO][7658] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.056 [INFO][7658] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.264 [INFO][7695] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.265 [INFO][7695] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.265 [INFO][7695] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.276 [WARNING][7695] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.276 [INFO][7695] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.278 [INFO][7695] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:59.283104 env[1773]: 2025-05-10 00:51:59.281 [INFO][7658] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.284710 env[1773]: time="2025-05-10T00:51:59.283133496Z" level=info msg="TearDown network for sandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" successfully" May 10 00:51:59.284710 env[1773]: time="2025-05-10T00:51:59.283162598Z" level=info msg="StopPodSandbox for \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" returns successfully" May 10 00:51:59.287097 env[1773]: time="2025-05-10T00:51:59.287053170Z" level=info msg="RemovePodSandbox for \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\"" May 10 00:51:59.287309 env[1773]: time="2025-05-10T00:51:59.287102991Z" level=info msg="Forcibly stopping sandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\"" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.329 [WARNING][7714] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.329 [INFO][7714] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.329 [INFO][7714] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" iface="eth0" netns="" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.329 [INFO][7714] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.329 [INFO][7714] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.361 [INFO][7721] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.362 [INFO][7721] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.362 [INFO][7721] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.368 [WARNING][7721] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.368 [INFO][7721] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" HandleID="k8s-pod-network.341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--dv2zf-eth0" May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.370 [INFO][7721] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:59.375860 env[1773]: 2025-05-10 00:51:59.372 [INFO][7714] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68" May 10 00:51:59.377574 env[1773]: time="2025-05-10T00:51:59.375956160Z" level=info msg="TearDown network for sandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" successfully" May 10 00:51:59.385178 env[1773]: time="2025-05-10T00:51:59.385119943Z" level=info msg="RemovePodSandbox \"341f4a232ac79b1e81344d62b7c5d07a0b3af4b539a8b3d3b9de33f75ee54b68\" returns successfully" May 10 00:51:59.385785 env[1773]: time="2025-05-10T00:51:59.385757698Z" level=info msg="StopPodSandbox for \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\"" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.426 [WARNING][7739] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.426 [INFO][7739] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.426 [INFO][7739] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" iface="eth0" netns="" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.426 [INFO][7739] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.426 [INFO][7739] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.452 [INFO][7748] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.452 [INFO][7748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.452 [INFO][7748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.458 [WARNING][7748] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.458 [INFO][7748] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.460 [INFO][7748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:59.464560 env[1773]: 2025-05-10 00:51:59.462 [INFO][7739] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.465796 env[1773]: time="2025-05-10T00:51:59.464601116Z" level=info msg="TearDown network for sandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" successfully" May 10 00:51:59.465796 env[1773]: time="2025-05-10T00:51:59.464641435Z" level=info msg="StopPodSandbox for \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" returns successfully" May 10 00:51:59.465796 env[1773]: time="2025-05-10T00:51:59.465217698Z" level=info msg="RemovePodSandbox for \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\"" May 10 00:51:59.465992 env[1773]: time="2025-05-10T00:51:59.465254765Z" level=info msg="Forcibly stopping sandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\"" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.511 [WARNING][7766] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.511 [INFO][7766] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.511 [INFO][7766] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" iface="eth0" netns="" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.511 [INFO][7766] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.511 [INFO][7766] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.534 [INFO][7773] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.534 [INFO][7773] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.535 [INFO][7773] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.541 [WARNING][7773] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.541 [INFO][7773] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" HandleID="k8s-pod-network.1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" Workload="ip--172--31--21--73-k8s-calico--apiserver--6c4c664698--srrfv-eth0" May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.544 [INFO][7773] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:59.549250 env[1773]: 2025-05-10 00:51:59.546 [INFO][7766] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5" May 10 00:51:59.549250 env[1773]: time="2025-05-10T00:51:59.548111238Z" level=info msg="TearDown network for sandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" successfully" May 10 00:51:59.602604 env[1773]: time="2025-05-10T00:51:59.602549809Z" level=info msg="RemovePodSandbox \"1bbe1702d433a9f454ea17e2c6337eaab31bf01abb69a7598b9cbffa273919d5\" returns successfully" May 10 00:51:59.603112 env[1773]: time="2025-05-10T00:51:59.603068767Z" level=info msg="StopPodSandbox for \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\"" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.654 [WARNING][7791] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.655 [INFO][7791] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.655 [INFO][7791] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" iface="eth0" netns="" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.655 [INFO][7791] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.655 [INFO][7791] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.685 [INFO][7800] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.685 [INFO][7800] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.686 [INFO][7800] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.693 [WARNING][7800] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.693 [INFO][7800] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.695 [INFO][7800] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:59.699647 env[1773]: 2025-05-10 00:51:59.697 [INFO][7791] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.700543 env[1773]: time="2025-05-10T00:51:59.700472021Z" level=info msg="TearDown network for sandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" successfully" May 10 00:51:59.700655 env[1773]: time="2025-05-10T00:51:59.700626413Z" level=info msg="StopPodSandbox for \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" returns successfully" May 10 00:51:59.701263 env[1773]: time="2025-05-10T00:51:59.701225666Z" level=info msg="RemovePodSandbox for \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\"" May 10 00:51:59.701385 env[1773]: time="2025-05-10T00:51:59.701270430Z" level=info msg="Forcibly stopping sandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\"" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.741 [WARNING][7820] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" WorkloadEndpoint="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.741 [INFO][7820] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.741 [INFO][7820] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" iface="eth0" netns="" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.741 [INFO][7820] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.741 [INFO][7820] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.770 [INFO][7827] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.770 [INFO][7827] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.770 [INFO][7827] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.776 [WARNING][7827] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.776 [INFO][7827] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" HandleID="k8s-pod-network.ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" Workload="ip--172--31--21--73-k8s-calico--kube--controllers--68d949dddc--k4hpq-eth0" May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.778 [INFO][7827] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:59.782097 env[1773]: 2025-05-10 00:51:59.780 [INFO][7820] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a" May 10 00:51:59.782628 env[1773]: time="2025-05-10T00:51:59.782135917Z" level=info msg="TearDown network for sandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" successfully" May 10 00:51:59.791145 env[1773]: time="2025-05-10T00:51:59.791096691Z" level=info msg="RemovePodSandbox \"ecb99a5656bb630a90629a65d7e751d8bae77856af55b32a100ed0cb1827011a\" returns successfully" May 10 00:51:59.791744 env[1773]: time="2025-05-10T00:51:59.791707237Z" level=info msg="StopPodSandbox for \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\"" May 10 00:51:59.791947 env[1773]: time="2025-05-10T00:51:59.791814581Z" level=info msg="TearDown network for sandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" successfully" May 10 00:51:59.791947 env[1773]: time="2025-05-10T00:51:59.791860187Z" level=info msg="StopPodSandbox for \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" returns successfully" May 10 00:51:59.792411 env[1773]: time="2025-05-10T00:51:59.792382498Z" level=info msg="RemovePodSandbox for \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\"" May 10 00:51:59.792573 env[1773]: time="2025-05-10T00:51:59.792528129Z" level=info msg="Forcibly stopping sandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\"" May 10 00:51:59.792684 env[1773]: time="2025-05-10T00:51:59.792655488Z" level=info msg="TearDown network for sandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" successfully" May 10 00:51:59.800950 env[1773]: time="2025-05-10T00:51:59.800833812Z" level=info msg="RemovePodSandbox \"8c5da4988ed8ef6ffaaa0c377ece5c554e7664950a4c46e7872537650ecba65a\" returns successfully" May 10 00:51:59.802333 env[1773]: time="2025-05-10T00:51:59.802298472Z" level=info msg="StopPodSandbox for \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\"" May 10 00:51:59.802445 env[1773]: time="2025-05-10T00:51:59.802382574Z" level=info msg="TearDown network for sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" successfully" May 10 00:51:59.802445 env[1773]: time="2025-05-10T00:51:59.802414123Z" level=info msg="StopPodSandbox for \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" returns successfully" May 10 00:51:59.802760 env[1773]: time="2025-05-10T00:51:59.802737992Z" level=info msg="RemovePodSandbox for \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\"" May 10 00:51:59.802815 env[1773]: time="2025-05-10T00:51:59.802763166Z" level=info msg="Forcibly stopping sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\"" May 10 00:51:59.802848 env[1773]: time="2025-05-10T00:51:59.802825102Z" level=info msg="TearDown network for sandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" successfully" May 10 00:51:59.809637 env[1773]: time="2025-05-10T00:51:59.809564350Z" level=info msg="RemovePodSandbox \"0e99db7967cf8646b34089e373a647a6ed8868ab9f74cdefe827a2c64e99a251\" returns successfully" May 10 00:52:03.150523 systemd[1]: Started sshd@26-172.31.21.73:22-139.178.89.65:47916.service. May 10 00:52:03.158545 kernel: kauditd_printk_skb: 515 callbacks suppressed May 10 00:52:03.159688 kernel: audit: type=1130 audit(1746838323.150:785): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.73:22-139.178.89.65:47916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:03.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.73:22-139.178.89.65:47916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:03.389000 audit[7833]: USER_ACCT pid=7833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.398958 kernel: audit: type=1101 audit(1746838323.389:786): pid=7833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.399062 sshd[7833]: Accepted publickey for core from 139.178.89.65 port 47916 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:52:03.398000 audit[7833]: CRED_ACQ pid=7833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.403272 sshd[7833]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:03.411058 kernel: audit: type=1103 audit(1746838323.398:787): pid=7833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.411229 kernel: audit: type=1006 audit(1746838323.398:788): pid=7833 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:52:03.398000 audit[7833]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00a50300 a2=3 a3=0 items=0 ppid=1 pid=7833 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:03.419388 kernel: audit: type=1300 audit(1746838323.398:788): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00a50300 a2=3 a3=0 items=0 ppid=1 pid=7833 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:03.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:03.424613 kernel: audit: type=1327 audit(1746838323.398:788): proctitle=737368643A20636F7265205B707269765D May 10 00:52:03.421417 systemd[1]: Started session-27.scope. May 10 00:52:03.422424 systemd-logind[1758]: New session 27 of user core. May 10 00:52:03.430000 audit[7833]: USER_START pid=7833 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.441529 kernel: audit: type=1105 audit(1746838323.430:789): pid=7833 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.441650 kernel: audit: type=1103 audit(1746838323.432:790): pid=7836 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:03.432000 audit[7836]: CRED_ACQ pid=7836 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:04.019629 sshd[7833]: pam_unix(sshd:session): session closed for user core May 10 00:52:04.020000 audit[7833]: USER_END pid=7833 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:04.022844 systemd[1]: sshd@26-172.31.21.73:22-139.178.89.65:47916.service: Deactivated successfully. May 10 00:52:04.023654 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:52:04.029528 kernel: audit: type=1106 audit(1746838324.020:791): pid=7833 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:04.030092 systemd-logind[1758]: Session 27 logged out. Waiting for processes to exit. May 10 00:52:04.020000 audit[7833]: CRED_DISP pid=7833 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:04.037569 kernel: audit: type=1104 audit(1746838324.020:792): pid=7833 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:04.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.21.73:22-139.178.89.65:47916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:04.038355 systemd-logind[1758]: Removed session 27. May 10 00:52:12.241597 update_engine[1766]: I0510 00:52:12.240567 1766 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 10 00:52:12.243229 update_engine[1766]: I0510 00:52:12.241613 1766 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 10 00:52:12.247607 update_engine[1766]: I0510 00:52:12.247570 1766 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 10 00:52:12.248754 update_engine[1766]: I0510 00:52:12.248721 1766 omaha_request_params.cc:62] Current group set to lts May 10 00:52:12.256423 update_engine[1766]: I0510 00:52:12.256307 1766 update_attempter.cc:499] Already updated boot flags. Skipping. May 10 00:52:12.256423 update_engine[1766]: I0510 00:52:12.256333 1766 update_attempter.cc:643] Scheduling an action processor start. May 10 00:52:12.256423 update_engine[1766]: I0510 00:52:12.256358 1766 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 10 00:52:12.258075 update_engine[1766]: I0510 00:52:12.258037 1766 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 10 00:52:12.258190 update_engine[1766]: I0510 00:52:12.258157 1766 omaha_request_action.cc:270] Posting an Omaha request to disabled May 10 00:52:12.258190 update_engine[1766]: I0510 00:52:12.258165 1766 omaha_request_action.cc:271] Request: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: May 10 00:52:12.258190 update_engine[1766]: I0510 00:52:12.258172 1766 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:12.272694 update_engine[1766]: I0510 00:52:12.272642 1766 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:12.274239 update_engine[1766]: I0510 00:52:12.274197 1766 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:12.304671 locksmithd[1827]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 10 00:52:12.308130 update_engine[1766]: E0510 00:52:12.308070 1766 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:12.308984 update_engine[1766]: I0510 00:52:12.308946 1766 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 10 00:52:14.798377 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:52:14.806218 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.806324 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.822541 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.822675 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.830361 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.848005 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.848117 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.860607 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.870564 kernel: audit: type=1400 audit(1746838334.788:794): avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.788000 audit: BPF prog-id=61 op=LOAD May 10 00:52:14.788000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc21622630 a2=98 a3=3 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.797000 audit: BPF prog-id=61 op=UNLOAD May 10 00:52:14.798000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.798000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.874505 kernel: audit: type=1334 audit(1746838334.788:794): prog-id=61 op=LOAD May 10 00:52:14.798000 audit: BPF prog-id=62 op=LOAD May 10 00:52:14.798000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc21622410 a2=74 a3=540051 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.798000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.805000 audit: BPF prog-id=62 op=UNLOAD May 10 00:52:14.805000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.805000 audit: BPF prog-id=63 op=LOAD May 10 00:52:14.805000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc21622440 a2=94 a3=2 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.805000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.813000 audit: BPF prog-id=63 op=UNLOAD May 10 00:52:14.954000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.954000 audit: BPF prog-id=64 op=LOAD May 10 00:52:14.954000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc21622300 a2=40 a3=1 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.954000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.955000 audit: BPF prog-id=64 op=UNLOAD May 10 00:52:14.955000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.955000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc216223d0 a2=50 a3=7ffc216224b0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.965000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.965000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21622310 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.965000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21622340 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21622250 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21622360 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21622340 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21622330 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc21622360 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.966000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.966000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21622340 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.966000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21622360 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc21622330 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc216223a0 a2=28 a3=0 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc21622150 a2=50 a3=1 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit: BPF prog-id=65 op=LOAD May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc21622150 a2=94 a3=5 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit: BPF prog-id=65 op=UNLOAD May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc21622200 a2=50 a3=1 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc21622320 a2=4 a3=38 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { confidentiality } for pid=7916 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc21622370 a2=94 a3=6 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.967000 audit[7916]: AVC avc: denied { confidentiality } for pid=7916 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:14.967000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc21621b20 a2=94 a3=83 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.967000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.968000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { perfmon } for pid=7916 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { bpf } for pid=7916 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.968000 audit[7916]: AVC avc: denied { confidentiality } for pid=7916 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:14.968000 audit[7916]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc21621b20 a2=94 a3=83 items=0 ppid=7902 pid=7916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.968000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:52:14.969000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.969000 audit: BPF prog-id=66 op=LOAD May 10 00:52:14.969000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffeb2191f0 a2=98 a3=3 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.969000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:14.970000 audit: BPF prog-id=66 op=UNLOAD May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit: BPF prog-id=67 op=LOAD May 10 00:52:14.970000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffeb218fd0 a2=74 a3=540051 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.970000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:14.970000 audit: BPF prog-id=67 op=UNLOAD May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:14.970000 audit: BPF prog-id=68 op=LOAD May 10 00:52:14.970000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffeb219000 a2=94 a3=2 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:14.970000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:14.970000 audit: BPF prog-id=68 op=UNLOAD May 10 00:52:15.096000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.096000 audit: BPF prog-id=69 op=LOAD May 10 00:52:15.096000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffeb218ec0 a2=40 a3=1 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.096000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.097000 audit: BPF prog-id=69 op=UNLOAD May 10 00:52:15.097000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.097000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffeb218f90 a2=50 a3=7fffeb219070 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.097000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.115000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.115000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeb218ed0 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.115000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.115000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.115000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeb218f00 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.115000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.115000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.115000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeb218e10 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.115000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.116000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.116000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeb218f20 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.116000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.116000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeb218f00 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.116000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.116000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeb218ef0 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.116000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.116000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeb218f20 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.116000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.116000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeb218f00 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.117000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.117000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeb218f20 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.117000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffeb218ef0 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffeb218f60 a2=28 a3=0 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffeb218d10 a2=50 a3=1 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit: BPF prog-id=70 op=LOAD May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffeb218d10 a2=94 a3=5 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit: BPF prog-id=70 op=UNLOAD May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffeb218dc0 a2=50 a3=1 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffeb218ee0 a2=4 a3=38 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.118000 audit[7917]: AVC avc: denied { confidentiality } for pid=7917 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:15.118000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffeb218f30 a2=94 a3=6 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.118000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.119000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.119000 audit[7917]: AVC avc: denied { confidentiality } for pid=7917 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:15.119000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffeb2186e0 a2=94 a3=83 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.119000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.120000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { perfmon } for pid=7917 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { bpf } for pid=7917 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.120000 audit[7917]: AVC avc: denied { confidentiality } for pid=7917 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:52:15.120000 audit[7917]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffeb2186e0 a2=94 a3=83 items=0 ppid=7902 pid=7917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.120000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:52:15.153000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.153000 audit: BPF prog-id=71 op=LOAD May 10 00:52:15.153000 audit[7938]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9475e190 a2=98 a3=1999999999999999 items=0 ppid=7902 pid=7938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.153000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:52:15.154000 audit: BPF prog-id=71 op=UNLOAD May 10 00:52:15.154000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.154000 audit: BPF prog-id=72 op=LOAD May 10 00:52:15.154000 audit[7938]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9475e070 a2=74 a3=ffff items=0 ppid=7902 pid=7938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.154000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:52:15.157000 audit: BPF prog-id=72 op=UNLOAD May 10 00:52:15.159000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { perfmon } for pid=7938 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit[7938]: AVC avc: denied { bpf } for pid=7938 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:15.159000 audit: BPF prog-id=73 op=LOAD May 10 00:52:15.159000 audit[7938]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9475e0b0 a2=40 a3=7ffe9475e290 items=0 ppid=7902 pid=7938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:15.159000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:52:15.160000 audit: BPF prog-id=73 op=UNLOAD May 10 00:52:22.224148 update_engine[1766]: I0510 00:52:22.223594 1766 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:22.224148 update_engine[1766]: I0510 00:52:22.223932 1766 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:22.224148 update_engine[1766]: I0510 00:52:22.224112 1766 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:22.225283 update_engine[1766]: E0510 00:52:22.224920 1766 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:22.225283 update_engine[1766]: I0510 00:52:22.224996 1766 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 10 00:52:22.440519 systemd[1]: run-containerd-runc-k8s.io-370969d7e9b76ecce9e25e5ca8a08b7a5a9fe3d2a237451f69babdcaf82f0dc0-runc.S8VfZ8.mount: Deactivated successfully. May 10 00:52:23.235231 systemd[1]: run-containerd-runc-k8s.io-1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f-runc.wk0ICc.mount: Deactivated successfully. May 10 00:52:32.223599 update_engine[1766]: I0510 00:52:32.223531 1766 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:32.224092 update_engine[1766]: I0510 00:52:32.223850 1766 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:32.224092 update_engine[1766]: I0510 00:52:32.224020 1766 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:32.224861 update_engine[1766]: E0510 00:52:32.224838 1766 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:32.224940 update_engine[1766]: I0510 00:52:32.224921 1766 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 10 00:52:42.223270 update_engine[1766]: I0510 00:52:42.223219 1766 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:42.223747 update_engine[1766]: I0510 00:52:42.223453 1766 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:42.223747 update_engine[1766]: I0510 00:52:42.223636 1766 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:42.224120 update_engine[1766]: E0510 00:52:42.224097 1766 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:42.224229 update_engine[1766]: I0510 00:52:42.224175 1766 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 10 00:52:42.224229 update_engine[1766]: I0510 00:52:42.224181 1766 omaha_request_action.cc:621] Omaha request response: May 10 00:52:42.224305 update_engine[1766]: E0510 00:52:42.224246 1766 omaha_request_action.cc:640] Omaha request network transfer failed. May 10 00:52:42.224305 update_engine[1766]: I0510 00:52:42.224267 1766 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 10 00:52:42.224305 update_engine[1766]: I0510 00:52:42.224270 1766 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 10 00:52:42.224305 update_engine[1766]: I0510 00:52:42.224273 1766 update_attempter.cc:306] Processing Done. May 10 00:52:42.224305 update_engine[1766]: E0510 00:52:42.224287 1766 update_attempter.cc:619] Update failed. May 10 00:52:42.224305 update_engine[1766]: I0510 00:52:42.224292 1766 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 10 00:52:42.224305 update_engine[1766]: I0510 00:52:42.224294 1766 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 10 00:52:42.224305 update_engine[1766]: I0510 00:52:42.224298 1766 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.224365 1766 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.224385 1766 omaha_request_action.cc:270] Posting an Omaha request to disabled May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.224388 1766 omaha_request_action.cc:271] Request: May 10 00:52:42.226009 update_engine[1766]: May 10 00:52:42.226009 update_engine[1766]: May 10 00:52:42.226009 update_engine[1766]: May 10 00:52:42.226009 update_engine[1766]: May 10 00:52:42.226009 update_engine[1766]: May 10 00:52:42.226009 update_engine[1766]: May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.224393 1766 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.224537 1766 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.224642 1766 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:42.226009 update_engine[1766]: E0510 00:52:42.224954 1766 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.225023 1766 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.225029 1766 omaha_request_action.cc:621] Omaha request response: May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.225033 1766 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.225037 1766 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.225040 1766 update_attempter.cc:306] Processing Done. May 10 00:52:42.226009 update_engine[1766]: I0510 00:52:42.225050 1766 update_attempter.cc:310] Error event sent. May 10 00:52:42.227126 locksmithd[1827]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 10 00:52:42.227126 locksmithd[1827]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 10 00:52:42.227440 update_engine[1766]: I0510 00:52:42.225060 1766 update_check_scheduler.cc:74] Next update check in 47m7s May 10 00:52:49.230826 amazon-ssm-agent[1737]: 2025-05-10 00:52:49 INFO [HealthCheck] HealthCheck reporting agent health. May 10 00:52:50.468620 env[1773]: time="2025-05-10T00:52:50.468545632Z" level=info msg="shim disconnected" id=57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c May 10 00:52:50.472592 env[1773]: time="2025-05-10T00:52:50.469168949Z" level=warning msg="cleaning up after shim disconnected" id=57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c namespace=k8s.io May 10 00:52:50.472592 env[1773]: time="2025-05-10T00:52:50.469194580Z" level=info msg="cleaning up dead shim" May 10 00:52:50.471020 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c-rootfs.mount: Deactivated successfully. May 10 00:52:50.482180 env[1773]: time="2025-05-10T00:52:50.482131152Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:52:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8456 runtime=io.containerd.runc.v2\n" May 10 00:52:51.122651 kubelet[2789]: I0510 00:52:51.122592 2789 scope.go:117] "RemoveContainer" containerID="57d9f7a3fc6caa560dd6b8509c654662446415e03674a9972b13367caa71bc1c" May 10 00:52:51.163557 env[1773]: time="2025-05-10T00:52:51.163503786Z" level=info msg="CreateContainer within sandbox \"61ecb34b3da79f6b658c47ed58ac76b789680078a192bee515a945282ab34f5c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" May 10 00:52:51.190505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1092649898.mount: Deactivated successfully. May 10 00:52:51.200181 env[1773]: time="2025-05-10T00:52:51.200128884Z" level=info msg="CreateContainer within sandbox \"61ecb34b3da79f6b658c47ed58ac76b789680078a192bee515a945282ab34f5c\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"484a39ce71d6eb890740744c848e4e87aefb48aeec2a1d525a46c83535ac1ef0\"" May 10 00:52:51.202095 env[1773]: time="2025-05-10T00:52:51.202060562Z" level=info msg="StartContainer for \"484a39ce71d6eb890740744c848e4e87aefb48aeec2a1d525a46c83535ac1ef0\"" May 10 00:52:51.262256 env[1773]: time="2025-05-10T00:52:51.262212939Z" level=info msg="StartContainer for \"484a39ce71d6eb890740744c848e4e87aefb48aeec2a1d525a46c83535ac1ef0\" returns successfully" May 10 00:52:51.512906 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562-rootfs.mount: Deactivated successfully. May 10 00:52:51.514464 env[1773]: time="2025-05-10T00:52:51.514420097Z" level=info msg="shim disconnected" id=1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562 May 10 00:52:51.514818 env[1773]: time="2025-05-10T00:52:51.514465267Z" level=warning msg="cleaning up after shim disconnected" id=1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562 namespace=k8s.io May 10 00:52:51.514818 env[1773]: time="2025-05-10T00:52:51.514475485Z" level=info msg="cleaning up dead shim" May 10 00:52:51.523308 env[1773]: time="2025-05-10T00:52:51.523260969Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:52:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8514 runtime=io.containerd.runc.v2\n" May 10 00:52:52.104405 kubelet[2789]: I0510 00:52:52.104371 2789 scope.go:117] "RemoveContainer" containerID="1f584ef2a1a2dd49f7182aff09ef78b3c80a837531a963a9b209b61de43ec562" May 10 00:52:52.106877 env[1773]: time="2025-05-10T00:52:52.106838698Z" level=info msg="CreateContainer within sandbox \"52871be8268052a2fff9454b6d2eb0fcbdd433cb657b398a9f8cab6042496411\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" May 10 00:52:52.132817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1592284437.mount: Deactivated successfully. May 10 00:52:52.146694 env[1773]: time="2025-05-10T00:52:52.146642881Z" level=info msg="CreateContainer within sandbox \"52871be8268052a2fff9454b6d2eb0fcbdd433cb657b398a9f8cab6042496411\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"6e9556fcd7c739027df8665ae3eb76bd1cae409f803ecc1e84d4e1f18b5de25d\"" May 10 00:52:52.147441 env[1773]: time="2025-05-10T00:52:52.147218805Z" level=info msg="StartContainer for \"6e9556fcd7c739027df8665ae3eb76bd1cae409f803ecc1e84d4e1f18b5de25d\"" May 10 00:52:52.239363 env[1773]: time="2025-05-10T00:52:52.239312739Z" level=info msg="StartContainer for \"6e9556fcd7c739027df8665ae3eb76bd1cae409f803ecc1e84d4e1f18b5de25d\" returns successfully" May 10 00:52:52.470975 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1707471623.mount: Deactivated successfully. May 10 00:52:52.796726 systemd[1]: run-containerd-runc-k8s.io-1ab94be4b02ec38b3256162b2bfc38cc3ca074042c0a4b8a2f5bd61f8348134f-runc.DeOV5f.mount: Deactivated successfully. May 10 00:52:56.854413 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28-rootfs.mount: Deactivated successfully. May 10 00:52:56.856119 env[1773]: time="2025-05-10T00:52:56.854675152Z" level=info msg="shim disconnected" id=6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28 May 10 00:52:56.856119 env[1773]: time="2025-05-10T00:52:56.854724172Z" level=warning msg="cleaning up after shim disconnected" id=6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28 namespace=k8s.io May 10 00:52:56.856119 env[1773]: time="2025-05-10T00:52:56.854733354Z" level=info msg="cleaning up dead shim" May 10 00:52:56.866163 env[1773]: time="2025-05-10T00:52:56.866119118Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:52:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8618 runtime=io.containerd.runc.v2\n" May 10 00:52:57.118036 kubelet[2789]: I0510 00:52:57.117911 2789 scope.go:117] "RemoveContainer" containerID="6f01af8f0b3dfaee066a53f21c556ad6d0c061fee7b2d6e689b35a042e20aa28" May 10 00:52:57.121127 env[1773]: time="2025-05-10T00:52:57.121083970Z" level=info msg="CreateContainer within sandbox \"cda085209a40fa1d65bba533c277447f7dd16b58c79e1a589cc7689ab066ca29\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" May 10 00:52:57.142098 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3530377831.mount: Deactivated successfully. May 10 00:52:57.150778 env[1773]: time="2025-05-10T00:52:57.150723765Z" level=info msg="CreateContainer within sandbox \"cda085209a40fa1d65bba533c277447f7dd16b58c79e1a589cc7689ab066ca29\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"bca6b2da17fee944aad38017f49676c5c8a7af79c0695be111cfa2cdafc82781\"" May 10 00:52:57.151284 env[1773]: time="2025-05-10T00:52:57.151219879Z" level=info msg="StartContainer for \"bca6b2da17fee944aad38017f49676c5c8a7af79c0695be111cfa2cdafc82781\"" May 10 00:52:57.228303 env[1773]: time="2025-05-10T00:52:57.228251212Z" level=info msg="StartContainer for \"bca6b2da17fee944aad38017f49676c5c8a7af79c0695be111cfa2cdafc82781\" returns successfully" May 10 00:52:59.106137 kubelet[2789]: E0510 00:52:59.106064 2789 controller.go:195] "Failed to update lease" err="Put \"https://172.31.21.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-73?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" May 10 00:53:09.107036 kubelet[2789]: E0510 00:53:09.106971 2789 controller.go:195] "Failed to update lease" err="Put \"https://172.31.21.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-21-73?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"