May 10 00:49:21.999361 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:49:21.999392 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:21.999409 kernel: BIOS-provided physical RAM map: May 10 00:49:21.999420 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:49:21.999430 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable May 10 00:49:21.999440 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:49:21.999453 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:49:21.999463 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:49:21.999476 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:49:21.999487 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:49:21.999498 kernel: NX (Execute Disable) protection: active May 10 00:49:21.999509 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:49:21.999519 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable May 10 00:49:21.999530 kernel: extended physical RAM map: May 10 00:49:21.999546 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:49:21.999558 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable May 10 00:49:21.999569 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable May 10 00:49:21.999581 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable May 10 00:49:21.999593 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved May 10 00:49:21.999604 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data May 10 00:49:21.999616 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS May 10 00:49:21.999628 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable May 10 00:49:21.999639 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved May 10 00:49:21.999650 kernel: efi: EFI v2.70 by EDK II May 10 00:49:21.999665 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77004a98 May 10 00:49:21.999676 kernel: SMBIOS 2.7 present. May 10 00:49:21.999687 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 May 10 00:49:21.999699 kernel: Hypervisor detected: KVM May 10 00:49:21.999710 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:49:21.999722 kernel: kvm-clock: cpu 0, msr 1c196001, primary cpu clock May 10 00:49:21.999733 kernel: kvm-clock: using sched offset of 4069972586 cycles May 10 00:49:21.999746 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:49:21.999758 kernel: tsc: Detected 2499.996 MHz processor May 10 00:49:21.999770 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:49:21.999781 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:49:21.999796 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 May 10 00:49:21.999808 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:49:21.999820 kernel: Using GB pages for direct mapping May 10 00:49:21.999831 kernel: Secure boot disabled May 10 00:49:21.999918 kernel: ACPI: Early table checksum verification disabled May 10 00:49:21.999935 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) May 10 00:49:21.999949 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) May 10 00:49:21.999969 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) May 10 00:49:21.999983 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) May 10 00:49:21.999996 kernel: ACPI: FACS 0x00000000789D0000 000040 May 10 00:49:22.000008 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) May 10 00:49:22.000020 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) May 10 00:49:22.000033 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) May 10 00:49:22.000045 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) May 10 00:49:22.000060 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) May 10 00:49:22.000072 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:49:22.000084 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) May 10 00:49:22.000097 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) May 10 00:49:22.000110 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] May 10 00:49:22.000123 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] May 10 00:49:22.000135 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] May 10 00:49:22.000148 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] May 10 00:49:22.000161 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] May 10 00:49:22.000178 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] May 10 00:49:22.000191 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] May 10 00:49:22.000205 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] May 10 00:49:22.000219 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] May 10 00:49:22.000233 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] May 10 00:49:22.000246 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] May 10 00:49:22.000260 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:49:22.000273 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:49:22.000287 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] May 10 00:49:22.000317 kernel: NUMA: Initialized distance table, cnt=1 May 10 00:49:22.000330 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] May 10 00:49:22.000344 kernel: Zone ranges: May 10 00:49:22.000358 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:49:22.000371 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] May 10 00:49:22.000385 kernel: Normal empty May 10 00:49:22.000399 kernel: Movable zone start for each node May 10 00:49:22.000413 kernel: Early memory node ranges May 10 00:49:22.000426 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:49:22.000442 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] May 10 00:49:22.000456 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] May 10 00:49:22.000469 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] May 10 00:49:22.000483 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:49:22.000496 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:49:22.000510 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 10 00:49:22.000524 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges May 10 00:49:22.000537 kernel: ACPI: PM-Timer IO Port: 0xb008 May 10 00:49:22.000551 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:49:22.000567 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 May 10 00:49:22.000581 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:49:22.000595 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:49:22.000609 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:49:22.000622 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:49:22.000636 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:49:22.000649 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:49:22.000663 kernel: TSC deadline timer available May 10 00:49:22.000676 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:49:22.000692 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices May 10 00:49:22.000705 kernel: Booting paravirtualized kernel on KVM May 10 00:49:22.000719 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:49:22.000732 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:49:22.000746 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:49:22.000760 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:49:22.000773 kernel: pcpu-alloc: [0] 0 1 May 10 00:49:22.000787 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 May 10 00:49:22.000800 kernel: kvm-guest: PV spinlocks enabled May 10 00:49:22.000816 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:49:22.000829 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 May 10 00:49:22.000854 kernel: Policy zone: DMA32 May 10 00:49:22.000870 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:22.000884 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:49:22.000898 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:49:22.000912 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:49:22.000926 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:49:22.000942 kernel: Memory: 1876640K/2037804K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 160904K reserved, 0K cma-reserved) May 10 00:49:22.000956 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:49:22.000970 kernel: Kernel/User page tables isolation: enabled May 10 00:49:22.000984 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:49:22.000997 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:49:22.001011 kernel: rcu: Hierarchical RCU implementation. May 10 00:49:22.001026 kernel: rcu: RCU event tracing is enabled. May 10 00:49:22.001052 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:49:22.001067 kernel: Rude variant of Tasks RCU enabled. May 10 00:49:22.001082 kernel: Tracing variant of Tasks RCU enabled. May 10 00:49:22.001096 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:49:22.001110 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:49:22.001127 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:49:22.001141 kernel: random: crng init done May 10 00:49:22.001155 kernel: Console: colour dummy device 80x25 May 10 00:49:22.001169 kernel: printk: console [tty0] enabled May 10 00:49:22.001183 kernel: printk: console [ttyS0] enabled May 10 00:49:22.001197 kernel: ACPI: Core revision 20210730 May 10 00:49:22.001212 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns May 10 00:49:22.001229 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:49:22.001243 kernel: x2apic enabled May 10 00:49:22.001258 kernel: Switched APIC routing to physical x2apic. May 10 00:49:22.001272 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns May 10 00:49:22.001287 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499996) May 10 00:49:22.001302 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:49:22.001316 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:49:22.001333 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:49:22.001348 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:49:22.001362 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:49:22.001376 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:49:22.001391 kernel: RETBleed: Vulnerable May 10 00:49:22.001405 kernel: Speculative Store Bypass: Vulnerable May 10 00:49:22.001419 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:49:22.001433 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:49:22.001447 kernel: GDS: Unknown: Dependent on hypervisor status May 10 00:49:22.001462 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:49:22.001476 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:49:22.001493 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:49:22.001507 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' May 10 00:49:22.001522 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' May 10 00:49:22.001536 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:49:22.001550 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:49:22.001564 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:49:22.001579 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' May 10 00:49:22.001593 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:49:22.001608 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 May 10 00:49:22.001622 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 May 10 00:49:22.001636 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 May 10 00:49:22.001652 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 May 10 00:49:22.001667 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 May 10 00:49:22.001681 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 May 10 00:49:22.001695 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. May 10 00:49:22.001709 kernel: Freeing SMP alternatives memory: 32K May 10 00:49:22.001723 kernel: pid_max: default: 32768 minimum: 301 May 10 00:49:22.001737 kernel: LSM: Security Framework initializing May 10 00:49:22.001750 kernel: SELinux: Initializing. May 10 00:49:22.001765 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:49:22.001784 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:49:22.001806 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:49:22.001847 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:49:22.001862 kernel: signal: max sigframe size: 3632 May 10 00:49:22.001875 kernel: rcu: Hierarchical SRCU implementation. May 10 00:49:22.001889 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:49:22.001904 kernel: smp: Bringing up secondary CPUs ... May 10 00:49:22.001918 kernel: x86: Booting SMP configuration: May 10 00:49:22.001932 kernel: .... node #0, CPUs: #1 May 10 00:49:22.001943 kernel: kvm-clock: cpu 1, msr 1c196041, secondary cpu clock May 10 00:49:22.001957 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 May 10 00:49:22.001975 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 10 00:49:22.001990 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:49:22.002001 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:49:22.002014 kernel: smpboot: Max logical packages: 1 May 10 00:49:22.002029 kernel: smpboot: Total of 2 processors activated (9999.98 BogoMIPS) May 10 00:49:22.002040 kernel: devtmpfs: initialized May 10 00:49:22.002057 kernel: x86/mm: Memory block size: 128MB May 10 00:49:22.002073 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) May 10 00:49:22.002084 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:49:22.002098 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:49:22.002109 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:49:22.002121 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:49:22.002133 kernel: audit: initializing netlink subsys (disabled) May 10 00:49:22.002148 kernel: audit: type=2000 audit(1746838162.578:1): state=initialized audit_enabled=0 res=1 May 10 00:49:22.002162 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:49:22.002177 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:49:22.002192 kernel: cpuidle: using governor menu May 10 00:49:22.002207 kernel: ACPI: bus type PCI registered May 10 00:49:22.002224 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:49:22.002239 kernel: dca service started, version 1.12.1 May 10 00:49:22.002255 kernel: PCI: Using configuration type 1 for base access May 10 00:49:22.002270 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:49:22.002285 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:49:22.002300 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:49:22.002315 kernel: ACPI: Added _OSI(Module Device) May 10 00:49:22.002330 kernel: ACPI: Added _OSI(Processor Device) May 10 00:49:22.002345 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:49:22.002362 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:49:22.002378 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:49:22.002392 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:49:22.002408 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:49:22.002422 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 10 00:49:22.002437 kernel: ACPI: Interpreter enabled May 10 00:49:22.002452 kernel: ACPI: PM: (supports S0 S5) May 10 00:49:22.002466 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:49:22.002481 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:49:22.002498 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:49:22.002513 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:49:22.002719 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:49:22.009896 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:49:22.009937 kernel: acpiphp: Slot [3] registered May 10 00:49:22.009952 kernel: acpiphp: Slot [4] registered May 10 00:49:22.009964 kernel: acpiphp: Slot [5] registered May 10 00:49:22.009988 kernel: acpiphp: Slot [6] registered May 10 00:49:22.010001 kernel: acpiphp: Slot [7] registered May 10 00:49:22.010013 kernel: acpiphp: Slot [8] registered May 10 00:49:22.010026 kernel: acpiphp: Slot [9] registered May 10 00:49:22.010039 kernel: acpiphp: Slot [10] registered May 10 00:49:22.010052 kernel: acpiphp: Slot [11] registered May 10 00:49:22.010064 kernel: acpiphp: Slot [12] registered May 10 00:49:22.010077 kernel: acpiphp: Slot [13] registered May 10 00:49:22.010089 kernel: acpiphp: Slot [14] registered May 10 00:49:22.010102 kernel: acpiphp: Slot [15] registered May 10 00:49:22.010117 kernel: acpiphp: Slot [16] registered May 10 00:49:22.010130 kernel: acpiphp: Slot [17] registered May 10 00:49:22.010142 kernel: acpiphp: Slot [18] registered May 10 00:49:22.010155 kernel: acpiphp: Slot [19] registered May 10 00:49:22.010167 kernel: acpiphp: Slot [20] registered May 10 00:49:22.010180 kernel: acpiphp: Slot [21] registered May 10 00:49:22.010192 kernel: acpiphp: Slot [22] registered May 10 00:49:22.010205 kernel: acpiphp: Slot [23] registered May 10 00:49:22.010217 kernel: acpiphp: Slot [24] registered May 10 00:49:22.010233 kernel: acpiphp: Slot [25] registered May 10 00:49:22.010245 kernel: acpiphp: Slot [26] registered May 10 00:49:22.010258 kernel: acpiphp: Slot [27] registered May 10 00:49:22.010270 kernel: acpiphp: Slot [28] registered May 10 00:49:22.010283 kernel: acpiphp: Slot [29] registered May 10 00:49:22.010296 kernel: acpiphp: Slot [30] registered May 10 00:49:22.010308 kernel: acpiphp: Slot [31] registered May 10 00:49:22.010320 kernel: PCI host bridge to bus 0000:00 May 10 00:49:22.010468 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:49:22.010579 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:49:22.010682 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:49:22.010782 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:49:22.010894 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] May 10 00:49:22.010995 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:49:22.011123 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:49:22.011246 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:49:22.011370 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 May 10 00:49:22.011485 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 10 00:49:22.011596 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff May 10 00:49:22.011705 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff May 10 00:49:22.011816 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff May 10 00:49:22.012003 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff May 10 00:49:22.014972 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff May 10 00:49:22.015142 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff May 10 00:49:22.015287 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 May 10 00:49:22.015413 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] May 10 00:49:22.015536 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 10 00:49:22.015657 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb May 10 00:49:22.015780 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:49:22.015946 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 May 10 00:49:22.016061 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] May 10 00:49:22.016181 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 May 10 00:49:22.016293 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] May 10 00:49:22.016329 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:49:22.016343 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:49:22.016356 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:49:22.016373 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:49:22.016387 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:49:22.016400 kernel: iommu: Default domain type: Translated May 10 00:49:22.016413 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:49:22.016525 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device May 10 00:49:22.016638 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:49:22.016750 kernel: pci 0000:00:03.0: vgaarb: bridge control possible May 10 00:49:22.016766 kernel: vgaarb: loaded May 10 00:49:22.016779 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:49:22.016794 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:49:22.016808 kernel: PTP clock support registered May 10 00:49:22.016820 kernel: Registered efivars operations May 10 00:49:22.016833 kernel: PCI: Using ACPI for IRQ routing May 10 00:49:22.016855 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:49:22.016875 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] May 10 00:49:22.016889 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] May 10 00:49:22.016903 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] May 10 00:49:22.016917 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 May 10 00:49:22.016935 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter May 10 00:49:22.016950 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:49:22.016964 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:49:22.016979 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:49:22.016994 kernel: pnp: PnP ACPI init May 10 00:49:22.017010 kernel: pnp: PnP ACPI: found 5 devices May 10 00:49:22.017026 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:49:22.017041 kernel: NET: Registered PF_INET protocol family May 10 00:49:22.017056 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:49:22.017074 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:49:22.017089 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:49:22.017104 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:49:22.017119 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:49:22.017134 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:49:22.017149 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:49:22.017163 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:49:22.017176 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:49:22.017193 kernel: NET: Registered PF_XDP protocol family May 10 00:49:22.017319 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:49:22.017435 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:49:22.017547 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:49:22.017660 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:49:22.017771 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] May 10 00:49:22.018994 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:49:22.019131 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:49:22.019154 kernel: PCI: CLS 0 bytes, default 64 May 10 00:49:22.019169 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:49:22.019183 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093623c91, max_idle_ns: 440795291220 ns May 10 00:49:22.019196 kernel: clocksource: Switched to clocksource tsc May 10 00:49:22.019210 kernel: Initialise system trusted keyrings May 10 00:49:22.019225 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:49:22.019239 kernel: Key type asymmetric registered May 10 00:49:22.019253 kernel: Asymmetric key parser 'x509' registered May 10 00:49:22.019273 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:49:22.019296 kernel: io scheduler mq-deadline registered May 10 00:49:22.019310 kernel: io scheduler kyber registered May 10 00:49:22.019325 kernel: io scheduler bfq registered May 10 00:49:22.019340 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:49:22.019355 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:49:22.019370 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:49:22.019383 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:49:22.019396 kernel: i8042: Warning: Keylock active May 10 00:49:22.019411 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:49:22.019430 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:49:22.019567 kernel: rtc_cmos 00:00: RTC can wake from S4 May 10 00:49:22.021706 kernel: rtc_cmos 00:00: registered as rtc0 May 10 00:49:22.021862 kernel: rtc_cmos 00:00: setting system clock to 2025-05-10T00:49:21 UTC (1746838161) May 10 00:49:22.021988 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 10 00:49:22.022007 kernel: intel_pstate: CPU model not supported May 10 00:49:22.022023 kernel: efifb: probing for efifb May 10 00:49:22.022039 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k May 10 00:49:22.022059 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 May 10 00:49:22.022073 kernel: efifb: scrolling: redraw May 10 00:49:22.022088 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:49:22.022104 kernel: Console: switching to colour frame buffer device 100x37 May 10 00:49:22.022119 kernel: fb0: EFI VGA frame buffer device May 10 00:49:22.022135 kernel: pstore: Registered efi as persistent store backend May 10 00:49:22.022174 kernel: NET: Registered PF_INET6 protocol family May 10 00:49:22.022192 kernel: Segment Routing with IPv6 May 10 00:49:22.022208 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:49:22.022226 kernel: NET: Registered PF_PACKET protocol family May 10 00:49:22.022242 kernel: Key type dns_resolver registered May 10 00:49:22.022257 kernel: IPI shorthand broadcast: enabled May 10 00:49:22.022273 kernel: sched_clock: Marking stable (339268915, 135723865)->(559253779, -84260999) May 10 00:49:22.022288 kernel: registered taskstats version 1 May 10 00:49:22.022304 kernel: Loading compiled-in X.509 certificates May 10 00:49:22.022323 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:49:22.022338 kernel: Key type .fscrypt registered May 10 00:49:22.022354 kernel: Key type fscrypt-provisioning registered May 10 00:49:22.022372 kernel: pstore: Using crash dump compression: deflate May 10 00:49:22.022388 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:49:22.022403 kernel: ima: Allocated hash algorithm: sha1 May 10 00:49:22.022419 kernel: ima: No architecture policies found May 10 00:49:22.022434 kernel: clk: Disabling unused clocks May 10 00:49:22.022450 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:49:22.022466 kernel: Write protecting the kernel read-only data: 28672k May 10 00:49:22.022482 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:49:22.022497 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:49:22.022514 kernel: Run /init as init process May 10 00:49:22.022531 kernel: with arguments: May 10 00:49:22.022546 kernel: /init May 10 00:49:22.022561 kernel: with environment: May 10 00:49:22.022577 kernel: HOME=/ May 10 00:49:22.022592 kernel: TERM=linux May 10 00:49:22.022607 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:49:22.022627 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:49:22.022648 systemd[1]: Detected virtualization amazon. May 10 00:49:22.022664 systemd[1]: Detected architecture x86-64. May 10 00:49:22.022680 systemd[1]: Running in initrd. May 10 00:49:22.022696 systemd[1]: No hostname configured, using default hostname. May 10 00:49:22.022712 systemd[1]: Hostname set to . May 10 00:49:22.022729 systemd[1]: Initializing machine ID from VM UUID. May 10 00:49:22.022745 systemd[1]: Queued start job for default target initrd.target. May 10 00:49:22.022765 systemd[1]: Started systemd-ask-password-console.path. May 10 00:49:22.022783 systemd[1]: Reached target cryptsetup.target. May 10 00:49:22.022800 systemd[1]: Reached target paths.target. May 10 00:49:22.022816 systemd[1]: Reached target slices.target. May 10 00:49:22.022832 systemd[1]: Reached target swap.target. May 10 00:49:22.022861 systemd[1]: Reached target timers.target. May 10 00:49:22.022882 systemd[1]: Listening on iscsid.socket. May 10 00:49:22.022898 systemd[1]: Listening on iscsiuio.socket. May 10 00:49:22.022915 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:49:22.022932 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:49:22.022948 systemd[1]: Listening on systemd-journald.socket. May 10 00:49:22.022965 systemd[1]: Listening on systemd-networkd.socket. May 10 00:49:22.022982 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:49:22.022999 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:49:22.023018 systemd[1]: Reached target sockets.target. May 10 00:49:22.023035 systemd[1]: Starting kmod-static-nodes.service... May 10 00:49:22.023051 systemd[1]: Finished network-cleanup.service. May 10 00:49:22.023068 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:49:22.023084 systemd[1]: Starting systemd-journald.service... May 10 00:49:22.023101 systemd[1]: Starting systemd-modules-load.service... May 10 00:49:22.023117 systemd[1]: Starting systemd-resolved.service... May 10 00:49:22.023134 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:49:22.023151 systemd[1]: Finished kmod-static-nodes.service. May 10 00:49:22.023171 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:49:22.023188 kernel: audit: type=1130 audit(1746838162.003:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.023204 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:49:22.023221 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:49:22.023238 kernel: audit: type=1130 audit(1746838162.019:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.023260 systemd-journald[185]: Journal started May 10 00:49:22.023346 systemd-journald[185]: Runtime Journal (/run/log/journal/ec270d5826a19d9b101a7a2e386ae64a) is 4.8M, max 38.3M, 33.5M free. May 10 00:49:22.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.003437 systemd-modules-load[186]: Inserted module 'overlay' May 10 00:49:22.031531 systemd[1]: Started systemd-journald.service. May 10 00:49:22.034956 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:49:22.038939 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:49:22.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.056873 kernel: audit: type=1130 audit(1746838162.031:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.064343 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:49:22.065209 systemd-resolved[187]: Positive Trust Anchors: May 10 00:49:22.065221 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:49:22.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.065279 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:49:22.091052 kernel: audit: type=1130 audit(1746838162.070:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.083108 systemd-resolved[187]: Defaulting to hostname 'linux'. May 10 00:49:22.084376 systemd[1]: Started systemd-resolved.service. May 10 00:49:22.089499 systemd[1]: Reached target nss-lookup.target. May 10 00:49:22.112711 kernel: audit: type=1130 audit(1746838162.087:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.112750 kernel: audit: type=1130 audit(1746838162.095:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.096047 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:49:22.126258 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:49:22.126324 dracut-cmdline[202]: dracut-dracut-053 May 10 00:49:22.098653 systemd[1]: Starting dracut-cmdline.service... May 10 00:49:22.131504 kernel: Bridge firewalling registered May 10 00:49:22.128614 systemd-modules-load[186]: Inserted module 'br_netfilter' May 10 00:49:22.135538 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:49:22.161861 kernel: SCSI subsystem initialized May 10 00:49:22.183650 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:49:22.183723 kernel: device-mapper: uevent: version 1.0.3 May 10 00:49:22.186863 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:49:22.191148 systemd-modules-load[186]: Inserted module 'dm_multipath' May 10 00:49:22.192658 systemd[1]: Finished systemd-modules-load.service. May 10 00:49:22.206428 kernel: audit: type=1130 audit(1746838162.192:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.195234 systemd[1]: Starting systemd-sysctl.service... May 10 00:49:22.216324 systemd[1]: Finished systemd-sysctl.service. May 10 00:49:22.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.227882 kernel: audit: type=1130 audit(1746838162.216:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.232865 kernel: Loading iSCSI transport class v2.0-870. May 10 00:49:22.251869 kernel: iscsi: registered transport (tcp) May 10 00:49:22.276987 kernel: iscsi: registered transport (qla4xxx) May 10 00:49:22.277067 kernel: QLogic iSCSI HBA Driver May 10 00:49:22.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.308589 systemd[1]: Finished dracut-cmdline.service. May 10 00:49:22.317208 kernel: audit: type=1130 audit(1746838162.307:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.310584 systemd[1]: Starting dracut-pre-udev.service... May 10 00:49:22.364894 kernel: raid6: avx512x4 gen() 18131 MB/s May 10 00:49:22.382886 kernel: raid6: avx512x4 xor() 8289 MB/s May 10 00:49:22.400884 kernel: raid6: avx512x2 gen() 18079 MB/s May 10 00:49:22.418875 kernel: raid6: avx512x2 xor() 24421 MB/s May 10 00:49:22.436873 kernel: raid6: avx512x1 gen() 18027 MB/s May 10 00:49:22.454891 kernel: raid6: avx512x1 xor() 22043 MB/s May 10 00:49:22.472901 kernel: raid6: avx2x4 gen() 17683 MB/s May 10 00:49:22.490887 kernel: raid6: avx2x4 xor() 7496 MB/s May 10 00:49:22.508887 kernel: raid6: avx2x2 gen() 17890 MB/s May 10 00:49:22.526899 kernel: raid6: avx2x2 xor() 17652 MB/s May 10 00:49:22.544871 kernel: raid6: avx2x1 gen() 13889 MB/s May 10 00:49:22.562870 kernel: raid6: avx2x1 xor() 15738 MB/s May 10 00:49:22.580866 kernel: raid6: sse2x4 gen() 9525 MB/s May 10 00:49:22.598863 kernel: raid6: sse2x4 xor() 6019 MB/s May 10 00:49:22.616862 kernel: raid6: sse2x2 gen() 10532 MB/s May 10 00:49:22.634861 kernel: raid6: sse2x2 xor() 6260 MB/s May 10 00:49:22.652861 kernel: raid6: sse2x1 gen() 9489 MB/s May 10 00:49:22.671175 kernel: raid6: sse2x1 xor() 4870 MB/s May 10 00:49:22.671217 kernel: raid6: using algorithm avx512x4 gen() 18131 MB/s May 10 00:49:22.671236 kernel: raid6: .... xor() 8289 MB/s, rmw enabled May 10 00:49:22.672333 kernel: raid6: using avx512x2 recovery algorithm May 10 00:49:22.686868 kernel: xor: automatically using best checksumming function avx May 10 00:49:22.787870 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:49:22.797234 systemd[1]: Finished dracut-pre-udev.service. May 10 00:49:22.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.796000 audit: BPF prog-id=7 op=LOAD May 10 00:49:22.796000 audit: BPF prog-id=8 op=LOAD May 10 00:49:22.798855 systemd[1]: Starting systemd-udevd.service... May 10 00:49:22.812394 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 10 00:49:22.817827 systemd[1]: Started systemd-udevd.service. May 10 00:49:22.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.820874 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:49:22.840408 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation May 10 00:49:22.871522 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:49:22.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.873077 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:49:22.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:22.915130 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:49:22.969857 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:49:22.978637 kernel: ena 0000:00:05.0: ENA device version: 0.10 May 10 00:49:23.020629 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 May 10 00:49:23.020810 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. May 10 00:49:23.020987 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:49:23.021018 kernel: AES CTR mode by8 optimization enabled May 10 00:49:23.021039 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:26:c9:a6:02:63 May 10 00:49:23.023272 (udev-worker)[443]: Network interface NamePolicy= disabled on kernel command line. May 10 00:49:23.043870 kernel: nvme nvme0: pci function 0000:00:04.0 May 10 00:49:23.044117 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:49:23.056862 kernel: nvme nvme0: 2/0/0 default/read/poll queues May 10 00:49:23.063741 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:49:23.063807 kernel: GPT:9289727 != 16777215 May 10 00:49:23.063820 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:49:23.065332 kernel: GPT:9289727 != 16777215 May 10 00:49:23.066420 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:49:23.067755 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:23.130879 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (430) May 10 00:49:23.162677 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:49:23.172032 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:49:23.187574 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:49:23.198689 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:49:23.199437 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:49:23.201707 systemd[1]: Starting disk-uuid.service... May 10 00:49:23.208273 disk-uuid[593]: Primary Header is updated. May 10 00:49:23.208273 disk-uuid[593]: Secondary Entries is updated. May 10 00:49:23.208273 disk-uuid[593]: Secondary Header is updated. May 10 00:49:23.214876 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:23.220863 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:23.226928 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:24.228946 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 May 10 00:49:24.229018 disk-uuid[594]: The operation has completed successfully. May 10 00:49:24.330039 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:49:24.330130 systemd[1]: Finished disk-uuid.service. May 10 00:49:24.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.336507 systemd[1]: Starting verity-setup.service... May 10 00:49:24.365864 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:49:24.457466 systemd[1]: Found device dev-mapper-usr.device. May 10 00:49:24.459604 systemd[1]: Mounting sysusr-usr.mount... May 10 00:49:24.463199 systemd[1]: Finished verity-setup.service. May 10 00:49:24.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.550646 systemd[1]: Mounted sysusr-usr.mount. May 10 00:49:24.552903 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:49:24.551951 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:49:24.553098 systemd[1]: Starting ignition-setup.service... May 10 00:49:24.559762 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:49:24.582884 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:24.582954 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:49:24.582973 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:49:24.603868 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:49:24.618571 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:49:24.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.631822 systemd[1]: Finished ignition-setup.service. May 10 00:49:24.633615 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:49:24.646446 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:49:24.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.646000 audit: BPF prog-id=9 op=LOAD May 10 00:49:24.649832 systemd[1]: Starting systemd-networkd.service... May 10 00:49:24.672938 systemd-networkd[1105]: lo: Link UP May 10 00:49:24.672950 systemd-networkd[1105]: lo: Gained carrier May 10 00:49:24.673571 systemd-networkd[1105]: Enumeration completed May 10 00:49:24.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.673688 systemd[1]: Started systemd-networkd.service. May 10 00:49:24.673986 systemd-networkd[1105]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:49:24.677978 systemd-networkd[1105]: eth0: Link UP May 10 00:49:24.677985 systemd-networkd[1105]: eth0: Gained carrier May 10 00:49:24.678049 systemd[1]: Reached target network.target. May 10 00:49:24.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.679818 systemd[1]: Starting iscsiuio.service... May 10 00:49:24.687579 systemd[1]: Started iscsiuio.service. May 10 00:49:24.690557 systemd[1]: Starting iscsid.service... May 10 00:49:24.695806 iscsid[1110]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:49:24.695806 iscsid[1110]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:49:24.695806 iscsid[1110]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:49:24.695806 iscsid[1110]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:49:24.695806 iscsid[1110]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:49:24.695806 iscsid[1110]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:49:24.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.697347 systemd[1]: Started iscsid.service. May 10 00:49:24.697968 systemd-networkd[1105]: eth0: DHCPv4 address 172.31.28.58/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:49:24.702229 systemd[1]: Starting dracut-initqueue.service... May 10 00:49:24.719926 systemd[1]: Finished dracut-initqueue.service. May 10 00:49:24.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:24.720998 systemd[1]: Reached target remote-fs-pre.target. May 10 00:49:24.722357 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:49:24.723708 systemd[1]: Reached target remote-fs.target. May 10 00:49:24.726306 systemd[1]: Starting dracut-pre-mount.service... May 10 00:49:24.736251 systemd[1]: Finished dracut-pre-mount.service. May 10 00:49:24.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.102016 ignition[1099]: Ignition 2.14.0 May 10 00:49:25.102028 ignition[1099]: Stage: fetch-offline May 10 00:49:25.102140 ignition[1099]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:25.102173 ignition[1099]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:25.120099 ignition[1099]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:25.120687 ignition[1099]: Ignition finished successfully May 10 00:49:25.121605 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:49:25.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.123377 systemd[1]: Starting ignition-fetch.service... May 10 00:49:25.131811 ignition[1129]: Ignition 2.14.0 May 10 00:49:25.131821 ignition[1129]: Stage: fetch May 10 00:49:25.131972 ignition[1129]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:25.131997 ignition[1129]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:25.138612 ignition[1129]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:25.139412 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:25.167726 ignition[1129]: INFO : PUT result: OK May 10 00:49:25.170656 ignition[1129]: DEBUG : parsed url from cmdline: "" May 10 00:49:25.170656 ignition[1129]: INFO : no config URL provided May 10 00:49:25.170656 ignition[1129]: INFO : reading system config file "/usr/lib/ignition/user.ign" May 10 00:49:25.170656 ignition[1129]: INFO : no config at "/usr/lib/ignition/user.ign" May 10 00:49:25.173428 ignition[1129]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:25.173428 ignition[1129]: INFO : PUT result: OK May 10 00:49:25.173428 ignition[1129]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 May 10 00:49:25.175703 ignition[1129]: INFO : GET result: OK May 10 00:49:25.175703 ignition[1129]: DEBUG : parsing config with SHA512: 280f0a7ba7c7426e5548bb73c169a8e0954dfa71fb17a93c7a57492a8e88a1e7f4b50b01200ee482296a6bbe4c292e7390dea25e35eb5a7405bf5a45a9afa5eb May 10 00:49:25.179194 unknown[1129]: fetched base config from "system" May 10 00:49:25.179209 unknown[1129]: fetched base config from "system" May 10 00:49:25.179219 unknown[1129]: fetched user config from "aws" May 10 00:49:25.182373 ignition[1129]: fetch: fetch complete May 10 00:49:25.182383 ignition[1129]: fetch: fetch passed May 10 00:49:25.182433 ignition[1129]: Ignition finished successfully May 10 00:49:25.185510 systemd[1]: Finished ignition-fetch.service. May 10 00:49:25.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.186986 systemd[1]: Starting ignition-kargs.service... May 10 00:49:25.195832 ignition[1135]: Ignition 2.14.0 May 10 00:49:25.195870 ignition[1135]: Stage: kargs May 10 00:49:25.196018 ignition[1135]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:25.196040 ignition[1135]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:25.202474 ignition[1135]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:25.203148 ignition[1135]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:25.203720 ignition[1135]: INFO : PUT result: OK May 10 00:49:25.205445 ignition[1135]: kargs: kargs passed May 10 00:49:25.205497 ignition[1135]: Ignition finished successfully May 10 00:49:25.206771 systemd[1]: Finished ignition-kargs.service. May 10 00:49:25.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.208230 systemd[1]: Starting ignition-disks.service... May 10 00:49:25.216657 ignition[1141]: Ignition 2.14.0 May 10 00:49:25.216671 ignition[1141]: Stage: disks May 10 00:49:25.216912 ignition[1141]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:25.216944 ignition[1141]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:25.223949 ignition[1141]: no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:25.225039 ignition[1141]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:25.225859 ignition[1141]: INFO : PUT result: OK May 10 00:49:25.227994 ignition[1141]: disks: disks passed May 10 00:49:25.228073 ignition[1141]: Ignition finished successfully May 10 00:49:25.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.229218 systemd[1]: Finished ignition-disks.service. May 10 00:49:25.230058 systemd[1]: Reached target initrd-root-device.target. May 10 00:49:25.231184 systemd[1]: Reached target local-fs-pre.target. May 10 00:49:25.232348 systemd[1]: Reached target local-fs.target. May 10 00:49:25.233451 systemd[1]: Reached target sysinit.target. May 10 00:49:25.234501 systemd[1]: Reached target basic.target. May 10 00:49:25.236876 systemd[1]: Starting systemd-fsck-root.service... May 10 00:49:25.264338 systemd-fsck[1149]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:49:25.267761 systemd[1]: Finished systemd-fsck-root.service. May 10 00:49:25.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.269317 systemd[1]: Mounting sysroot.mount... May 10 00:49:25.291601 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:49:25.293453 systemd[1]: Mounted sysroot.mount. May 10 00:49:25.296587 systemd[1]: Reached target initrd-root-fs.target. May 10 00:49:25.304917 systemd[1]: Mounting sysroot-usr.mount... May 10 00:49:25.306939 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:49:25.307556 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:49:25.307585 systemd[1]: Reached target ignition-diskful.target. May 10 00:49:25.309884 systemd[1]: Mounted sysroot-usr.mount. May 10 00:49:25.311454 systemd[1]: Starting initrd-setup-root.service... May 10 00:49:25.324449 initrd-setup-root[1170]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:49:25.356938 initrd-setup-root[1178]: cut: /sysroot/etc/group: No such file or directory May 10 00:49:25.361080 initrd-setup-root[1186]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:49:25.366022 initrd-setup-root[1194]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:49:25.484140 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:49:25.502873 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1202) May 10 00:49:25.507435 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm May 10 00:49:25.507502 kernel: BTRFS info (device nvme0n1p6): using free space tree May 10 00:49:25.507516 kernel: BTRFS info (device nvme0n1p6): has skinny extents May 10 00:49:25.528859 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations May 10 00:49:25.529313 systemd[1]: Finished initrd-setup-root.service. May 10 00:49:25.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.530890 systemd[1]: Starting ignition-mount.service... May 10 00:49:25.533953 systemd[1]: Starting sysroot-boot.service... May 10 00:49:25.538178 bash[1230]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:49:25.541847 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:49:25.547398 ignition[1231]: INFO : Ignition 2.14.0 May 10 00:49:25.547398 ignition[1231]: INFO : Stage: mount May 10 00:49:25.548971 ignition[1231]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:25.548971 ignition[1231]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:25.553639 ignition[1231]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:25.554598 ignition[1231]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:25.555293 ignition[1231]: INFO : PUT result: OK May 10 00:49:25.557773 ignition[1231]: INFO : mount: mount passed May 10 00:49:25.558432 ignition[1231]: INFO : Ignition finished successfully May 10 00:49:25.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.559644 systemd[1]: Finished ignition-mount.service. May 10 00:49:25.561169 systemd[1]: Starting ignition-files.service... May 10 00:49:25.576973 systemd[1]: Finished sysroot-boot.service. May 10 00:49:25.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:25.581660 ignition[1241]: INFO : Ignition 2.14.0 May 10 00:49:25.581660 ignition[1241]: INFO : Stage: files May 10 00:49:25.583112 ignition[1241]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:25.583112 ignition[1241]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:25.588358 ignition[1241]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:25.589134 ignition[1241]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:25.589850 ignition[1241]: INFO : PUT result: OK May 10 00:49:25.592588 ignition[1241]: DEBUG : files: compiled without relabeling support, skipping May 10 00:49:25.597924 ignition[1241]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:49:25.597924 ignition[1241]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:49:25.603011 ignition[1241]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:49:25.604523 ignition[1241]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:49:25.606641 unknown[1241]: wrote ssh authorized keys file for user: core May 10 00:49:25.607559 ignition[1241]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:49:25.614857 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:49:25.616447 ignition[1241]: INFO : GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 May 10 00:49:25.715049 ignition[1241]: INFO : GET result: OK May 10 00:49:25.866351 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" May 10 00:49:25.866351 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:49:25.872375 ignition[1241]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:25.875382 ignition[1241]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3688430999" May 10 00:49:25.875382 ignition[1241]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3688430999": device or resource busy May 10 00:49:25.875382 ignition[1241]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3688430999", trying btrfs: device or resource busy May 10 00:49:25.875382 ignition[1241]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3688430999" May 10 00:49:25.887300 ignition[1241]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3688430999" May 10 00:49:25.891242 ignition[1241]: INFO : op(3): [started] unmounting "/mnt/oem3688430999" May 10 00:49:25.893101 systemd[1]: mnt-oem3688430999.mount: Deactivated successfully. May 10 00:49:25.894789 ignition[1241]: INFO : op(3): [finished] unmounting "/mnt/oem3688430999" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:49:25.894789 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:49:25.927558 ignition[1241]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:25.927558 ignition[1241]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2944391989" May 10 00:49:25.927558 ignition[1241]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2944391989": device or resource busy May 10 00:49:25.927558 ignition[1241]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2944391989", trying btrfs: device or resource busy May 10 00:49:25.927558 ignition[1241]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2944391989" May 10 00:49:25.927558 ignition[1241]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2944391989" May 10 00:49:25.927558 ignition[1241]: INFO : op(6): [started] unmounting "/mnt/oem2944391989" May 10 00:49:25.927558 ignition[1241]: INFO : op(6): [finished] unmounting "/mnt/oem2944391989" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" May 10 00:49:25.927558 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:49:25.927558 ignition[1241]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:25.927558 ignition[1241]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2064835114" May 10 00:49:25.927558 ignition[1241]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2064835114": device or resource busy May 10 00:49:25.971189 ignition[1241]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2064835114", trying btrfs: device or resource busy May 10 00:49:25.971189 ignition[1241]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2064835114" May 10 00:49:25.971189 ignition[1241]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2064835114" May 10 00:49:25.971189 ignition[1241]: INFO : op(9): [started] unmounting "/mnt/oem2064835114" May 10 00:49:25.971189 ignition[1241]: INFO : op(9): [finished] unmounting "/mnt/oem2064835114" May 10 00:49:25.971189 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" May 10 00:49:25.971189 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:49:25.971189 ignition[1241]: INFO : oem config not found in "/usr/share/oem", looking on oem partition May 10 00:49:25.971189 ignition[1241]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640160211" May 10 00:49:25.971189 ignition[1241]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640160211": device or resource busy May 10 00:49:25.971189 ignition[1241]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3640160211", trying btrfs: device or resource busy May 10 00:49:25.971189 ignition[1241]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640160211" May 10 00:49:25.971189 ignition[1241]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3640160211" May 10 00:49:25.971189 ignition[1241]: INFO : op(c): [started] unmounting "/mnt/oem3640160211" May 10 00:49:25.971189 ignition[1241]: INFO : op(c): [finished] unmounting "/mnt/oem3640160211" May 10 00:49:25.971189 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:49:25.971189 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:25.971189 ignition[1241]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 May 10 00:49:26.435732 ignition[1241]: INFO : GET result: OK May 10 00:49:26.500981 systemd-networkd[1105]: eth0: Gained IPv6LL May 10 00:49:26.821159 ignition[1241]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" May 10 00:49:26.823157 ignition[1241]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:49:26.823157 ignition[1241]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:49:26.823157 ignition[1241]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(12): [started] processing unit "nvidia.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(12): [finished] processing unit "nvidia.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(13): [started] processing unit "prepare-helm.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(15): [started] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(15): [finished] setting preset to enabled for "amazon-ssm-agent.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:49:26.828113 ignition[1241]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:49:26.828113 ignition[1241]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:49:26.900968 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:49:26.901002 kernel: audit: type=1130 audit(1746838166.833:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.901023 kernel: audit: type=1130 audit(1746838166.854:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.901047 kernel: audit: type=1131 audit(1746838166.854:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.901064 kernel: audit: type=1130 audit(1746838166.872:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.901286 ignition[1241]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:49:26.901286 ignition[1241]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:49:26.901286 ignition[1241]: INFO : files: files passed May 10 00:49:26.901286 ignition[1241]: INFO : Ignition finished successfully May 10 00:49:26.922754 kernel: audit: type=1130 audit(1746838166.906:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.922792 kernel: audit: type=1131 audit(1746838166.906:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.833433 systemd[1]: Finished ignition-files.service. May 10 00:49:26.840797 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:49:26.928102 initrd-setup-root-after-ignition[1266]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:49:26.847568 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:49:26.848496 systemd[1]: Starting ignition-quench.service... May 10 00:49:26.854098 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:49:26.854212 systemd[1]: Finished ignition-quench.service. May 10 00:49:26.867230 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:49:26.874472 systemd[1]: Reached target ignition-complete.target. May 10 00:49:26.953566 kernel: audit: type=1130 audit(1746838166.941:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.884539 systemd[1]: Starting initrd-parse-etc.service... May 10 00:49:26.906699 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:49:26.906828 systemd[1]: Finished initrd-parse-etc.service. May 10 00:49:26.908563 systemd[1]: Reached target initrd-fs.target. May 10 00:49:26.921957 systemd[1]: Reached target initrd.target. May 10 00:49:26.923902 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:49:26.925232 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:49:26.942464 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:49:26.945005 systemd[1]: Starting initrd-cleanup.service... May 10 00:49:26.963916 systemd[1]: Stopped target nss-lookup.target. May 10 00:49:26.977154 kernel: audit: type=1131 audit(1746838166.969:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.966194 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:49:26.967733 systemd[1]: Stopped target timers.target. May 10 00:49:26.969347 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:49:26.969550 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:49:26.971078 systemd[1]: Stopped target initrd.target. May 10 00:49:26.978118 systemd[1]: Stopped target basic.target. May 10 00:49:26.979588 systemd[1]: Stopped target ignition-complete.target. May 10 00:49:26.981162 systemd[1]: Stopped target ignition-diskful.target. May 10 00:49:26.982574 systemd[1]: Stopped target initrd-root-device.target. May 10 00:49:26.983987 systemd[1]: Stopped target remote-fs.target. May 10 00:49:26.985504 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:49:26.986927 systemd[1]: Stopped target sysinit.target. May 10 00:49:27.000258 kernel: audit: type=1131 audit(1746838166.992:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.988471 systemd[1]: Stopped target local-fs.target. May 10 00:49:26.989850 systemd[1]: Stopped target local-fs-pre.target. May 10 00:49:27.009157 kernel: audit: type=1131 audit(1746838167.000:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.991196 systemd[1]: Stopped target swap.target. May 10 00:49:27.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.992606 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:49:27.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:26.992813 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:49:26.994269 systemd[1]: Stopped target cryptsetup.target. May 10 00:49:27.001266 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:49:27.001478 systemd[1]: Stopped dracut-initqueue.service. May 10 00:49:27.002963 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:49:27.003165 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:49:27.010207 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:49:27.010409 systemd[1]: Stopped ignition-files.service. May 10 00:49:27.035000 ignition[1279]: INFO : Ignition 2.14.0 May 10 00:49:27.035000 ignition[1279]: INFO : Stage: umount May 10 00:49:27.035000 ignition[1279]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:49:27.035000 ignition[1279]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b May 10 00:49:27.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.051489 iscsid[1110]: iscsid shutting down. May 10 00:49:27.013129 systemd[1]: Stopping ignition-mount.service... May 10 00:49:27.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.057807 ignition[1279]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" May 10 00:49:27.057807 ignition[1279]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 May 10 00:49:27.057807 ignition[1279]: INFO : PUT result: OK May 10 00:49:27.057807 ignition[1279]: INFO : umount: umount passed May 10 00:49:27.057807 ignition[1279]: INFO : Ignition finished successfully May 10 00:49:27.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.030362 systemd[1]: Stopping iscsid.service... May 10 00:49:27.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.033257 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:49:27.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.033571 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:49:27.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.039547 systemd[1]: Stopping sysroot-boot.service... May 10 00:49:27.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.043613 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:49:27.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.043949 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:49:27.048481 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:49:27.048704 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:49:27.054210 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:49:27.054353 systemd[1]: Stopped iscsid.service. May 10 00:49:27.059567 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:49:27.059693 systemd[1]: Stopped ignition-mount.service. May 10 00:49:27.064747 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:49:27.067571 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:49:27.067683 systemd[1]: Finished initrd-cleanup.service. May 10 00:49:27.070208 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:49:27.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.070276 systemd[1]: Stopped ignition-disks.service. May 10 00:49:27.071084 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:49:27.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.071140 systemd[1]: Stopped ignition-kargs.service. May 10 00:49:27.072648 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:49:27.072704 systemd[1]: Stopped ignition-fetch.service. May 10 00:49:27.074064 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:49:27.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.074120 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:49:27.075488 systemd[1]: Stopped target paths.target. May 10 00:49:27.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.104000 audit: BPF prog-id=6 op=UNLOAD May 10 00:49:27.077010 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:49:27.080972 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:49:27.082007 systemd[1]: Stopped target slices.target. May 10 00:49:27.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.083305 systemd[1]: Stopped target sockets.target. May 10 00:49:27.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.085466 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:49:27.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.085526 systemd[1]: Closed iscsid.socket. May 10 00:49:27.086849 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:49:27.086915 systemd[1]: Stopped ignition-setup.service. May 10 00:49:27.088365 systemd[1]: Stopping iscsiuio.service... May 10 00:49:27.093132 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:49:27.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.093254 systemd[1]: Stopped iscsiuio.service. May 10 00:49:27.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.094480 systemd[1]: Stopped target network.target. May 10 00:49:27.095761 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:49:27.095810 systemd[1]: Closed iscsiuio.socket. May 10 00:49:27.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.097507 systemd[1]: Stopping systemd-networkd.service... May 10 00:49:27.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.098779 systemd[1]: Stopping systemd-resolved.service... May 10 00:49:27.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.099908 systemd-networkd[1105]: eth0: DHCPv6 lease lost May 10 00:49:27.143000 audit: BPF prog-id=9 op=UNLOAD May 10 00:49:27.101299 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:49:27.101422 systemd[1]: Stopped systemd-networkd.service. May 10 00:49:27.103645 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:49:27.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.103775 systemd[1]: Stopped systemd-resolved.service. May 10 00:49:27.105756 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:49:27.105801 systemd[1]: Closed systemd-networkd.socket. May 10 00:49:27.108254 systemd[1]: Stopping network-cleanup.service... May 10 00:49:27.110433 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:49:27.110503 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:49:27.112138 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:49:27.112196 systemd[1]: Stopped systemd-sysctl.service. May 10 00:49:27.113727 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:49:27.115122 systemd[1]: Stopped systemd-modules-load.service. May 10 00:49:27.116216 systemd[1]: Stopping systemd-udevd.service... May 10 00:49:27.122923 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:49:27.128168 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:49:27.128413 systemd[1]: Stopped systemd-udevd.service. May 10 00:49:27.129777 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:49:27.129906 systemd[1]: Stopped network-cleanup.service. May 10 00:49:27.131286 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:49:27.131336 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:49:27.132699 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:49:27.132744 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:49:27.134044 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:49:27.134099 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:49:27.135413 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:49:27.135467 systemd[1]: Stopped dracut-cmdline.service. May 10 00:49:27.136895 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:49:27.136951 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:49:27.139205 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:49:27.143138 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:49:27.143239 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:49:27.148646 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:49:27.148779 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:49:27.208022 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:49:27.208122 systemd[1]: Stopped sysroot-boot.service. May 10 00:49:27.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.209652 systemd[1]: Reached target initrd-switch-root.target. May 10 00:49:27.210670 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:49:27.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:27.210735 systemd[1]: Stopped initrd-setup-root.service. May 10 00:49:27.212716 systemd[1]: Starting initrd-switch-root.service... May 10 00:49:27.224559 systemd[1]: Switching root. May 10 00:49:27.247031 systemd-journald[185]: Journal stopped May 10 00:49:32.389105 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). May 10 00:49:32.389200 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:49:32.389227 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:49:32.389257 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:49:32.389285 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:49:32.389307 kernel: SELinux: policy capability open_perms=1 May 10 00:49:32.389328 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:49:32.389350 kernel: SELinux: policy capability always_check_network=0 May 10 00:49:32.389376 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:49:32.389398 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:49:32.389420 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:49:32.389441 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:49:32.389464 systemd[1]: Successfully loaded SELinux policy in 105.554ms. May 10 00:49:32.389507 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.448ms. May 10 00:49:32.389532 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:49:32.389556 systemd[1]: Detected virtualization amazon. May 10 00:49:32.389582 systemd[1]: Detected architecture x86-64. May 10 00:49:32.389609 systemd[1]: Detected first boot. May 10 00:49:32.389633 systemd[1]: Initializing machine ID from VM UUID. May 10 00:49:32.389656 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:49:32.389684 systemd[1]: Populated /etc with preset unit settings. May 10 00:49:32.389710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:32.389735 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:32.389760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:32.389788 kernel: kauditd_printk_skb: 48 callbacks suppressed May 10 00:49:32.389808 kernel: audit: type=1334 audit(1746838172.058:87): prog-id=12 op=LOAD May 10 00:49:32.389829 kernel: audit: type=1334 audit(1746838172.058:88): prog-id=3 op=UNLOAD May 10 00:49:32.394590 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:49:32.394629 kernel: audit: type=1334 audit(1746838172.059:89): prog-id=13 op=LOAD May 10 00:49:32.394653 kernel: audit: type=1334 audit(1746838172.061:90): prog-id=14 op=LOAD May 10 00:49:32.394675 kernel: audit: type=1334 audit(1746838172.061:91): prog-id=4 op=UNLOAD May 10 00:49:32.394705 kernel: audit: type=1334 audit(1746838172.061:92): prog-id=5 op=UNLOAD May 10 00:49:32.394727 kernel: audit: type=1131 audit(1746838172.062:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.394749 systemd[1]: Stopped initrd-switch-root.service. May 10 00:49:32.394772 kernel: audit: type=1130 audit(1746838172.080:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.394796 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:49:32.394819 kernel: audit: type=1131 audit(1746838172.080:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.394856 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:49:32.394891 kernel: audit: type=1334 audit(1746838172.094:96): prog-id=12 op=UNLOAD May 10 00:49:32.394912 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:49:32.394937 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:49:32.394960 systemd[1]: Created slice system-getty.slice. May 10 00:49:32.394983 systemd[1]: Created slice system-modprobe.slice. May 10 00:49:32.395007 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:49:32.395030 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:49:32.395055 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:49:32.395081 systemd[1]: Created slice user.slice. May 10 00:49:32.395104 systemd[1]: Started systemd-ask-password-console.path. May 10 00:49:32.395127 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:49:32.395151 systemd[1]: Set up automount boot.automount. May 10 00:49:32.395175 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:49:32.395198 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:49:32.395223 systemd[1]: Stopped target initrd-fs.target. May 10 00:49:32.395246 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:49:32.395267 systemd[1]: Reached target integritysetup.target. May 10 00:49:32.395294 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:49:32.395318 systemd[1]: Reached target remote-fs.target. May 10 00:49:32.395341 systemd[1]: Reached target slices.target. May 10 00:49:32.395364 systemd[1]: Reached target swap.target. May 10 00:49:32.395387 systemd[1]: Reached target torcx.target. May 10 00:49:32.395410 systemd[1]: Reached target veritysetup.target. May 10 00:49:32.395434 systemd[1]: Listening on systemd-coredump.socket. May 10 00:49:32.395458 systemd[1]: Listening on systemd-initctl.socket. May 10 00:49:32.395482 systemd[1]: Listening on systemd-networkd.socket. May 10 00:49:32.395516 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:49:32.395536 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:49:32.395557 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:49:32.395577 systemd[1]: Mounting dev-hugepages.mount... May 10 00:49:32.395598 systemd[1]: Mounting dev-mqueue.mount... May 10 00:49:32.395627 systemd[1]: Mounting media.mount... May 10 00:49:32.395651 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:32.395676 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:49:32.395700 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:49:32.395721 systemd[1]: Mounting tmp.mount... May 10 00:49:32.395746 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:49:32.395772 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:32.395796 systemd[1]: Starting kmod-static-nodes.service... May 10 00:49:32.395821 systemd[1]: Starting modprobe@configfs.service... May 10 00:49:32.395854 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:32.395873 systemd[1]: Starting modprobe@drm.service... May 10 00:49:32.395891 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:32.395912 systemd[1]: Starting modprobe@fuse.service... May 10 00:49:32.395936 systemd[1]: Starting modprobe@loop.service... May 10 00:49:32.395960 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:49:32.395985 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:49:32.396009 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:49:32.396032 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:49:32.396060 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:49:32.396084 systemd[1]: Stopped systemd-journald.service. May 10 00:49:32.396108 systemd[1]: Starting systemd-journald.service... May 10 00:49:32.396132 kernel: fuse: init (API version 7.34) May 10 00:49:32.396155 systemd[1]: Starting systemd-modules-load.service... May 10 00:49:32.396180 systemd[1]: Starting systemd-network-generator.service... May 10 00:49:32.396204 systemd[1]: Starting systemd-remount-fs.service... May 10 00:49:32.396228 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:49:32.396258 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:49:32.396288 systemd[1]: Stopped verity-setup.service. May 10 00:49:32.396313 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:32.396336 kernel: loop: module loaded May 10 00:49:32.396360 systemd[1]: Mounted dev-hugepages.mount. May 10 00:49:32.396382 systemd[1]: Mounted dev-mqueue.mount. May 10 00:49:32.396406 systemd[1]: Mounted media.mount. May 10 00:49:32.396429 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:49:32.396453 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:49:32.396477 systemd[1]: Mounted tmp.mount. May 10 00:49:32.396502 systemd[1]: Finished kmod-static-nodes.service. May 10 00:49:32.396529 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:49:32.396554 systemd[1]: Finished modprobe@configfs.service. May 10 00:49:32.396579 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:32.396602 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:32.396624 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:49:32.396653 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:49:32.396678 systemd[1]: Finished modprobe@drm.service. May 10 00:49:32.396701 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:32.396732 systemd-journald[1392]: Journal started May 10 00:49:32.396829 systemd-journald[1392]: Runtime Journal (/run/log/journal/ec270d5826a19d9b101a7a2e386ae64a) is 4.8M, max 38.3M, 33.5M free. May 10 00:49:27.913000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:49:28.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:49:28.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:49:28.083000 audit: BPF prog-id=10 op=LOAD May 10 00:49:28.083000 audit: BPF prog-id=10 op=UNLOAD May 10 00:49:28.083000 audit: BPF prog-id=11 op=LOAD May 10 00:49:28.083000 audit: BPF prog-id=11 op=UNLOAD May 10 00:49:28.280000 audit[1314]: AVC avc: denied { associate } for pid=1314 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:49:28.280000 audit[1314]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1297 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.280000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:49:28.283000 audit[1314]: AVC avc: denied { associate } for pid=1314 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:49:28.283000 audit[1314]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1297 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.283000 audit: CWD cwd="/" May 10 00:49:28.283000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:28.283000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:28.283000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:49:32.058000 audit: BPF prog-id=12 op=LOAD May 10 00:49:32.058000 audit: BPF prog-id=3 op=UNLOAD May 10 00:49:32.404780 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:32.404832 systemd[1]: Started systemd-journald.service. May 10 00:49:32.059000 audit: BPF prog-id=13 op=LOAD May 10 00:49:32.061000 audit: BPF prog-id=14 op=LOAD May 10 00:49:32.061000 audit: BPF prog-id=4 op=UNLOAD May 10 00:49:32.061000 audit: BPF prog-id=5 op=UNLOAD May 10 00:49:32.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.094000 audit: BPF prog-id=12 op=UNLOAD May 10 00:49:32.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.266000 audit: BPF prog-id=15 op=LOAD May 10 00:49:32.266000 audit: BPF prog-id=16 op=LOAD May 10 00:49:32.266000 audit: BPF prog-id=17 op=LOAD May 10 00:49:32.266000 audit: BPF prog-id=13 op=UNLOAD May 10 00:49:32.266000 audit: BPF prog-id=14 op=UNLOAD May 10 00:49:32.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.385000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:49:32.385000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd724008c0 a2=4000 a3=7ffd7240095c items=0 ppid=1 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:32.385000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:49:32.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.057881 systemd[1]: Queued start job for default target multi-user.target. May 10 00:49:28.263761 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:32.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.057895 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. May 10 00:49:28.265181 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:49:32.063962 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:49:28.265202 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:49:32.408815 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:49:28.265235 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:49:28.265245 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:49:28.265278 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:49:28.265291 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:49:28.265491 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:49:28.265533 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:49:28.265545 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:49:28.273995 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:49:28.274044 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:49:28.274067 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:49:32.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:28.274082 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:49:32.411132 systemd[1]: Finished modprobe@fuse.service. May 10 00:49:28.274104 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:49:32.413489 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:28.274118 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:49:32.413697 systemd[1]: Finished modprobe@loop.service. May 10 00:49:31.500475 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:31Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:31.500754 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:31Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:31.500899 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:31Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:31.501086 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:31Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:49:31.501136 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:31Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:49:31.501193 /usr/lib/systemd/system-generators/torcx-generator[1314]: time="2025-05-10T00:49:31Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:49:32.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.417403 systemd[1]: Finished systemd-modules-load.service. May 10 00:49:32.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.419352 systemd[1]: Finished systemd-network-generator.service. May 10 00:49:32.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.421283 systemd[1]: Finished systemd-remount-fs.service. May 10 00:49:32.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.423568 systemd[1]: Reached target network-pre.target. May 10 00:49:32.426522 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:49:32.429531 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:49:32.434236 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:49:32.436659 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:49:32.438894 systemd[1]: Starting systemd-journal-flush.service... May 10 00:49:32.440323 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:32.442012 systemd[1]: Starting systemd-random-seed.service... May 10 00:49:32.444130 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:32.447059 systemd[1]: Starting systemd-sysctl.service... May 10 00:49:32.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.450445 systemd[1]: Starting systemd-sysusers.service... May 10 00:49:32.459298 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:49:32.460587 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:49:32.461656 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:49:32.465300 systemd[1]: Starting systemd-udev-settle.service... May 10 00:49:32.470267 systemd-journald[1392]: Time spent on flushing to /var/log/journal/ec270d5826a19d9b101a7a2e386ae64a is 41.935ms for 1213 entries. May 10 00:49:32.470267 systemd-journald[1392]: System Journal (/var/log/journal/ec270d5826a19d9b101a7a2e386ae64a) is 8.0M, max 195.6M, 187.6M free. May 10 00:49:32.520166 systemd-journald[1392]: Received client request to flush runtime journal. May 10 00:49:32.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.473350 systemd[1]: Finished systemd-random-seed.service. May 10 00:49:32.520552 udevadm[1430]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:49:32.474513 systemd[1]: Reached target first-boot-complete.target. May 10 00:49:32.501572 systemd[1]: Finished systemd-sysctl.service. May 10 00:49:32.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.521280 systemd[1]: Finished systemd-journal-flush.service. May 10 00:49:32.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:32.562303 systemd[1]: Finished systemd-sysusers.service. May 10 00:49:33.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.077232 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:49:33.076000 audit: BPF prog-id=18 op=LOAD May 10 00:49:33.076000 audit: BPF prog-id=19 op=LOAD May 10 00:49:33.076000 audit: BPF prog-id=7 op=UNLOAD May 10 00:49:33.076000 audit: BPF prog-id=8 op=UNLOAD May 10 00:49:33.079171 systemd[1]: Starting systemd-udevd.service... May 10 00:49:33.098137 systemd-udevd[1434]: Using default interface naming scheme 'v252'. May 10 00:49:33.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.153000 audit: BPF prog-id=20 op=LOAD May 10 00:49:33.154203 systemd[1]: Started systemd-udevd.service. May 10 00:49:33.156630 systemd[1]: Starting systemd-networkd.service... May 10 00:49:33.177000 audit: BPF prog-id=21 op=LOAD May 10 00:49:33.177000 audit: BPF prog-id=22 op=LOAD May 10 00:49:33.178000 audit: BPF prog-id=23 op=LOAD May 10 00:49:33.180982 systemd[1]: Starting systemd-userdbd.service... May 10 00:49:33.211077 (udev-worker)[1439]: Network interface NamePolicy= disabled on kernel command line. May 10 00:49:33.219871 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:49:33.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.237995 systemd[1]: Started systemd-userdbd.service. May 10 00:49:33.295974 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:49:33.331547 kernel: ACPI: button: Power Button [PWRF] May 10 00:49:33.331649 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 10 00:49:33.333000 audit[1447]: AVC avc: denied { confidentiality } for pid=1447 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:49:33.333000 audit[1447]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f4e6caa250 a1=338ac a2=7f4a1bd2cbc5 a3=5 items=110 ppid=1434 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:33.333000 audit: CWD cwd="/" May 10 00:49:33.333000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=1 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=2 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=3 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=4 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=5 name=(null) inode=13767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=6 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=7 name=(null) inode=13768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=8 name=(null) inode=13768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=9 name=(null) inode=13769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=10 name=(null) inode=13768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=11 name=(null) inode=13770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=12 name=(null) inode=13768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=13 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=14 name=(null) inode=13768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=15 name=(null) inode=13772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=16 name=(null) inode=13768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=17 name=(null) inode=13773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=18 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=19 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=20 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=21 name=(null) inode=13775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=22 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=23 name=(null) inode=13776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=24 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=25 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=26 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=27 name=(null) inode=13778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=28 name=(null) inode=13774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=29 name=(null) inode=13779 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=30 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=31 name=(null) inode=13780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=32 name=(null) inode=13780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=33 name=(null) inode=13781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=34 name=(null) inode=13780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=35 name=(null) inode=13782 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=36 name=(null) inode=13780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=37 name=(null) inode=13783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=38 name=(null) inode=13780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=39 name=(null) inode=13784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=40 name=(null) inode=13780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=41 name=(null) inode=13785 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=42 name=(null) inode=13765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=43 name=(null) inode=13786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=44 name=(null) inode=13786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=45 name=(null) inode=13787 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=46 name=(null) inode=13786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=47 name=(null) inode=13788 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=48 name=(null) inode=13786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=49 name=(null) inode=13789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=50 name=(null) inode=13786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=51 name=(null) inode=13790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=52 name=(null) inode=13786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=53 name=(null) inode=13791 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=55 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=56 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=57 name=(null) inode=13793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=58 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=59 name=(null) inode=13794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=60 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=61 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=62 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=63 name=(null) inode=13796 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=64 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=65 name=(null) inode=13797 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=66 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=67 name=(null) inode=13798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=68 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=69 name=(null) inode=13799 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=70 name=(null) inode=13795 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=71 name=(null) inode=13800 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=72 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=73 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=74 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=75 name=(null) inode=13802 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=76 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=77 name=(null) inode=13803 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=78 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=79 name=(null) inode=13804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=80 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=81 name=(null) inode=13805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=82 name=(null) inode=13801 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=83 name=(null) inode=13806 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=84 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=85 name=(null) inode=13807 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=86 name=(null) inode=13807 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=87 name=(null) inode=13808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=88 name=(null) inode=13807 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=89 name=(null) inode=13809 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=90 name=(null) inode=13807 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=91 name=(null) inode=13810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=92 name=(null) inode=13807 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=93 name=(null) inode=13811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=94 name=(null) inode=13807 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=95 name=(null) inode=13812 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=96 name=(null) inode=13792 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=97 name=(null) inode=13813 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=98 name=(null) inode=13813 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=99 name=(null) inode=13814 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=100 name=(null) inode=13813 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=101 name=(null) inode=13815 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=102 name=(null) inode=13813 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=103 name=(null) inode=13816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=104 name=(null) inode=13813 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=105 name=(null) inode=13817 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=106 name=(null) inode=13813 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=107 name=(null) inode=13818 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PATH item=109 name=(null) inode=13819 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:33.333000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:49:33.352893 kernel: ACPI: button: Sleep Button [SLPF] May 10 00:49:33.364912 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 May 10 00:49:33.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.367301 systemd-networkd[1442]: lo: Link UP May 10 00:49:33.367312 systemd-networkd[1442]: lo: Gained carrier May 10 00:49:33.367922 systemd-networkd[1442]: Enumeration completed May 10 00:49:33.368060 systemd[1]: Started systemd-networkd.service. May 10 00:49:33.370733 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:49:33.373144 systemd-networkd[1442]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:49:33.378888 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:49:33.378816 systemd-networkd[1442]: eth0: Link UP May 10 00:49:33.379250 systemd-networkd[1442]: eth0: Gained carrier May 10 00:49:33.389170 systemd-networkd[1442]: eth0: DHCPv4 address 172.31.28.58/20, gateway 172.31.16.1 acquired from 172.31.16.1 May 10 00:49:33.401861 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 10 00:49:33.419833 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:49:33.523644 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:49:33.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.527236 systemd[1]: Finished systemd-udev-settle.service. May 10 00:49:33.529171 systemd[1]: Starting lvm2-activation-early.service... May 10 00:49:33.583775 lvm[1548]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:49:33.611102 systemd[1]: Finished lvm2-activation-early.service. May 10 00:49:33.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.611819 systemd[1]: Reached target cryptsetup.target. May 10 00:49:33.613633 systemd[1]: Starting lvm2-activation.service... May 10 00:49:33.618364 lvm[1549]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:49:33.641254 systemd[1]: Finished lvm2-activation.service. May 10 00:49:33.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.641990 systemd[1]: Reached target local-fs-pre.target. May 10 00:49:33.642550 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:49:33.642581 systemd[1]: Reached target local-fs.target. May 10 00:49:33.643130 systemd[1]: Reached target machines.target. May 10 00:49:33.645170 systemd[1]: Starting ldconfig.service... May 10 00:49:33.646957 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:33.647056 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:33.648416 systemd[1]: Starting systemd-boot-update.service... May 10 00:49:33.650088 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:49:33.652054 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:49:33.657486 systemd[1]: Starting systemd-sysext.service... May 10 00:49:33.658404 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1551 (bootctl) May 10 00:49:33.662051 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:49:33.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.666050 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:49:33.676664 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:49:33.684518 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:49:33.684708 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:49:33.699547 kernel: loop0: detected capacity change from 0 to 218376 May 10 00:49:33.815623 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:49:33.817258 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:49:33.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.820863 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:49:33.836865 kernel: loop1: detected capacity change from 0 to 218376 May 10 00:49:33.837633 systemd-fsck[1560]: fsck.fat 4.2 (2021-01-31) May 10 00:49:33.837633 systemd-fsck[1560]: /dev/nvme0n1p1: 790 files, 120688/258078 clusters May 10 00:49:33.839030 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:49:33.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.841009 systemd[1]: Mounting boot.mount... May 10 00:49:33.849750 systemd[1]: Mounted boot.mount. May 10 00:49:33.867104 (sd-sysext)[1563]: Using extensions 'kubernetes'. May 10 00:49:33.867598 (sd-sysext)[1563]: Merged extensions into '/usr'. May 10 00:49:33.890222 systemd[1]: Finished systemd-boot-update.service. May 10 00:49:33.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.891643 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:33.893424 systemd[1]: Mounting usr-share-oem.mount... May 10 00:49:33.896350 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:33.898338 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:33.901186 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:33.904668 systemd[1]: Starting modprobe@loop.service... May 10 00:49:33.906124 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:33.906308 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:33.906413 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:33.909473 systemd[1]: Mounted usr-share-oem.mount. May 10 00:49:33.910699 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:33.910885 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:33.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.912200 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:33.912379 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:33.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.913599 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:33.913747 systemd[1]: Finished modprobe@loop.service. May 10 00:49:33.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.915043 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:33.915200 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:33.917330 systemd[1]: Finished systemd-sysext.service. May 10 00:49:33.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:33.919257 systemd[1]: Starting ensure-sysext.service... May 10 00:49:33.921714 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:49:33.929411 systemd[1]: Reloading. May 10 00:49:33.963639 systemd-tmpfiles[1582]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:49:33.985363 systemd-tmpfiles[1582]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:49:33.997501 systemd-tmpfiles[1582]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:49:34.011038 /usr/lib/systemd/system-generators/torcx-generator[1601]: time="2025-05-10T00:49:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:34.011077 /usr/lib/systemd/system-generators/torcx-generator[1601]: time="2025-05-10T00:49:34Z" level=info msg="torcx already run" May 10 00:49:34.154062 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:34.154084 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:34.205148 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:34.293000 audit: BPF prog-id=24 op=LOAD May 10 00:49:34.293000 audit: BPF prog-id=15 op=UNLOAD May 10 00:49:34.293000 audit: BPF prog-id=25 op=LOAD May 10 00:49:34.293000 audit: BPF prog-id=26 op=LOAD May 10 00:49:34.293000 audit: BPF prog-id=16 op=UNLOAD May 10 00:49:34.293000 audit: BPF prog-id=17 op=UNLOAD May 10 00:49:34.295000 audit: BPF prog-id=27 op=LOAD May 10 00:49:34.295000 audit: BPF prog-id=21 op=UNLOAD May 10 00:49:34.295000 audit: BPF prog-id=28 op=LOAD May 10 00:49:34.295000 audit: BPF prog-id=29 op=LOAD May 10 00:49:34.295000 audit: BPF prog-id=22 op=UNLOAD May 10 00:49:34.295000 audit: BPF prog-id=23 op=UNLOAD May 10 00:49:34.297000 audit: BPF prog-id=30 op=LOAD May 10 00:49:34.297000 audit: BPF prog-id=20 op=UNLOAD May 10 00:49:34.298000 audit: BPF prog-id=31 op=LOAD May 10 00:49:34.298000 audit: BPF prog-id=32 op=LOAD May 10 00:49:34.298000 audit: BPF prog-id=18 op=UNLOAD May 10 00:49:34.298000 audit: BPF prog-id=19 op=UNLOAD May 10 00:49:34.304169 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:49:34.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.311075 systemd[1]: Starting audit-rules.service... May 10 00:49:34.313491 systemd[1]: Starting clean-ca-certificates.service... May 10 00:49:34.317351 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:49:34.318000 audit: BPF prog-id=33 op=LOAD May 10 00:49:34.324000 audit: BPF prog-id=34 op=LOAD May 10 00:49:34.324008 systemd[1]: Starting systemd-resolved.service... May 10 00:49:34.329346 systemd[1]: Starting systemd-timesyncd.service... May 10 00:49:34.331929 systemd[1]: Starting systemd-update-utmp.service... May 10 00:49:34.333541 systemd[1]: Finished clean-ca-certificates.service. May 10 00:49:34.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.334775 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:34.347000 audit[1664]: SYSTEM_BOOT pid=1664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:49:34.353041 systemd[1]: Finished systemd-update-utmp.service. May 10 00:49:34.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.360168 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:34.362668 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:34.366316 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:49:34.370079 systemd[1]: Starting modprobe@loop.service... May 10 00:49:34.371730 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:34.371971 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:34.372161 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:34.373441 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:34.373637 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:34.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.379299 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:34.381196 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:49:34.382151 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:34.382355 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:34.382531 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:34.389079 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:49:34.391163 systemd[1]: Starting modprobe@drm.service... May 10 00:49:34.392940 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:49:34.393148 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:34.393367 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:49:34.397877 systemd[1]: Finished ensure-sysext.service. May 10 00:49:34.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.400440 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:49:34.400616 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:49:34.401558 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:49:34.402606 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:49:34.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.404064 systemd[1]: Finished modprobe@loop.service. May 10 00:49:34.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.418553 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:49:34.418730 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:49:34.419716 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:49:34.420142 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:49:34.420377 systemd[1]: Finished modprobe@drm.service. May 10 00:49:34.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.464069 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:49:34.498568 systemd-resolved[1661]: Positive Trust Anchors: May 10 00:49:34.498584 systemd-resolved[1661]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:49:34.498627 systemd-resolved[1661]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:49:34.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:34.507145 systemd[1]: Started systemd-timesyncd.service. May 10 00:49:34.507670 systemd[1]: Reached target time-set.target. May 10 00:49:34.507000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:49:34.507000 audit[1683]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb59da0a0 a2=420 a3=0 items=0 ppid=1658 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:34.509872 augenrules[1683]: No rules May 10 00:49:34.507000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:49:34.510478 systemd[1]: Finished audit-rules.service. May 10 00:49:34.531817 systemd-resolved[1661]: Defaulting to hostname 'linux'. May 10 00:49:34.533658 systemd[1]: Started systemd-resolved.service. May 10 00:49:34.534157 systemd[1]: Reached target network.target. May 10 00:49:34.534502 systemd[1]: Reached target nss-lookup.target. May 10 00:49:36.167272 systemd-resolved[1661]: Clock change detected. Flushing caches. May 10 00:49:36.167601 systemd-timesyncd[1662]: Contacted time server 208.67.75.242:123 (0.flatcar.pool.ntp.org). May 10 00:49:36.167788 systemd-timesyncd[1662]: Initial clock synchronization to Sat 2025-05-10 00:49:36.167183 UTC. May 10 00:49:36.238452 ldconfig[1550]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:49:36.241007 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:36.241037 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:49:36.247317 systemd[1]: Finished ldconfig.service. May 10 00:49:36.249277 systemd[1]: Starting systemd-update-done.service... May 10 00:49:36.257182 systemd[1]: Finished systemd-update-done.service. May 10 00:49:36.257752 systemd[1]: Reached target sysinit.target. May 10 00:49:36.258241 systemd[1]: Started motdgen.path. May 10 00:49:36.258664 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:49:36.259260 systemd[1]: Started logrotate.timer. May 10 00:49:36.259764 systemd[1]: Started mdadm.timer. May 10 00:49:36.260213 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:49:36.260627 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:49:36.260660 systemd[1]: Reached target paths.target. May 10 00:49:36.261028 systemd[1]: Reached target timers.target. May 10 00:49:36.261672 systemd[1]: Listening on dbus.socket. May 10 00:49:36.263179 systemd[1]: Starting docker.socket... May 10 00:49:36.267103 systemd[1]: Listening on sshd.socket. May 10 00:49:36.267635 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:36.268336 systemd[1]: Listening on docker.socket. May 10 00:49:36.268805 systemd[1]: Reached target sockets.target. May 10 00:49:36.269186 systemd[1]: Reached target basic.target. May 10 00:49:36.269587 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:49:36.269618 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:49:36.270697 systemd[1]: Starting containerd.service... May 10 00:49:36.272108 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:49:36.274236 systemd[1]: Starting dbus.service... May 10 00:49:36.276079 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:49:36.278002 systemd[1]: Starting extend-filesystems.service... May 10 00:49:36.278704 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:49:36.291032 jq[1695]: false May 10 00:49:36.285259 systemd[1]: Starting motdgen.service... May 10 00:49:36.288110 systemd[1]: Starting prepare-helm.service... May 10 00:49:36.291475 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:49:36.295881 systemd[1]: Starting sshd-keygen.service... May 10 00:49:36.302781 systemd[1]: Starting systemd-logind.service... May 10 00:49:36.303574 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:49:36.303677 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:49:36.304362 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:49:36.305438 systemd[1]: Starting update-engine.service... May 10 00:49:36.309366 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:49:36.317169 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:49:36.317414 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:49:36.325385 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:49:36.325662 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:49:36.351477 tar[1710]: linux-amd64/LICENSE May 10 00:49:36.351477 tar[1710]: linux-amd64/helm May 10 00:49:36.358833 jq[1705]: true May 10 00:49:36.381212 dbus-daemon[1694]: [system] SELinux support is enabled May 10 00:49:36.383527 dbus-daemon[1694]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1442 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 00:49:36.381434 systemd[1]: Started dbus.service. May 10 00:49:36.387772 dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 00:49:36.385447 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:49:36.385483 systemd[1]: Reached target system-config.target. May 10 00:49:36.388600 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:49:36.388628 systemd[1]: Reached target user-config.target. May 10 00:49:36.399442 systemd[1]: Starting systemd-hostnamed.service... May 10 00:49:36.404909 jq[1720]: true May 10 00:49:36.417807 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:49:36.418033 systemd[1]: Finished motdgen.service. May 10 00:49:36.420423 extend-filesystems[1696]: Found loop1 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p1 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p2 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p3 May 10 00:49:36.422102 extend-filesystems[1696]: Found usr May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p4 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p6 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p7 May 10 00:49:36.422102 extend-filesystems[1696]: Found nvme0n1p9 May 10 00:49:36.422102 extend-filesystems[1696]: Checking size of /dev/nvme0n1p9 May 10 00:49:36.485925 extend-filesystems[1696]: Resized partition /dev/nvme0n1p9 May 10 00:49:36.506549 extend-filesystems[1746]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:49:36.506562 systemd-networkd[1442]: eth0: Gained IPv6LL May 10 00:49:36.520682 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks May 10 00:49:36.510447 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:49:36.532293 update_engine[1702]: I0510 00:49:36.521052 1702 main.cc:92] Flatcar Update Engine starting May 10 00:49:36.532293 update_engine[1702]: I0510 00:49:36.532107 1702 update_check_scheduler.cc:74] Next update check in 2m16s May 10 00:49:36.511310 systemd[1]: Reached target network-online.target. May 10 00:49:36.513686 systemd[1]: Started amazon-ssm-agent.service. May 10 00:49:36.517766 systemd[1]: Starting kubelet.service... May 10 00:49:36.521009 systemd[1]: Started nvidia.service. May 10 00:49:36.558917 env[1711]: time="2025-05-10T00:49:36.557459545Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:49:36.527390 systemd[1]: Started update-engine.service. May 10 00:49:36.530840 systemd[1]: Started locksmithd.service. May 10 00:49:36.691741 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 May 10 00:49:36.724046 extend-filesystems[1746]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required May 10 00:49:36.724046 extend-filesystems[1746]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 00:49:36.724046 extend-filesystems[1746]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. May 10 00:49:36.722832 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:49:36.728459 extend-filesystems[1696]: Resized filesystem in /dev/nvme0n1p9 May 10 00:49:36.723049 systemd[1]: Finished extend-filesystems.service. May 10 00:49:36.737190 systemd[1]: Created slice system-sshd.slice. May 10 00:49:36.743657 bash[1749]: Updated "/home/core/.ssh/authorized_keys" May 10 00:49:36.744535 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:49:36.806815 amazon-ssm-agent[1750]: 2025/05/10 00:49:36 Failed to load instance info from vault. RegistrationKey does not exist. May 10 00:49:36.808974 amazon-ssm-agent[1750]: Initializing new seelog logger May 10 00:49:36.828691 dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 00:49:36.828896 systemd[1]: Started systemd-hostnamed.service. May 10 00:49:36.830621 dbus-daemon[1694]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1725 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 00:49:36.833892 systemd[1]: Starting polkit.service... May 10 00:49:36.849897 amazon-ssm-agent[1750]: New Seelog Logger Creation Complete May 10 00:49:36.850150 amazon-ssm-agent[1750]: 2025/05/10 00:49:36 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:49:36.851471 systemd-logind[1701]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:49:36.851821 amazon-ssm-agent[1750]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. May 10 00:49:36.852236 amazon-ssm-agent[1750]: 2025/05/10 00:49:36 processing appconfig overrides May 10 00:49:36.854108 polkitd[1781]: Started polkitd version 121 May 10 00:49:36.856732 systemd-logind[1701]: Watching system buttons on /dev/input/event2 (Sleep Button) May 10 00:49:36.857987 systemd-logind[1701]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:49:36.858337 systemd-logind[1701]: New seat seat0. May 10 00:49:36.862606 systemd[1]: Started systemd-logind.service. May 10 00:49:36.879411 polkitd[1781]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:49:36.879493 polkitd[1781]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:49:36.881373 polkitd[1781]: Finished loading, compiling and executing 2 rules May 10 00:49:36.881913 dbus-daemon[1694]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:49:36.882090 systemd[1]: Started polkit.service. May 10 00:49:36.884123 polkitd[1781]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:49:36.897861 systemd-hostnamed[1725]: Hostname set to (transient) May 10 00:49:36.909073 systemd-resolved[1661]: System hostname changed to 'ip-172-31-28-58'. May 10 00:49:36.945303 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:49:36.951198 env[1711]: time="2025-05-10T00:49:36.951148910Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:49:36.951354 env[1711]: time="2025-05-10T00:49:36.951330201Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:36.958524 env[1711]: time="2025-05-10T00:49:36.958411514Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:49:36.958524 env[1711]: time="2025-05-10T00:49:36.958469427Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:36.958848 env[1711]: time="2025-05-10T00:49:36.958812680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:49:36.958921 env[1711]: time="2025-05-10T00:49:36.958850235Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:49:36.958921 env[1711]: time="2025-05-10T00:49:36.958870161Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:49:36.958921 env[1711]: time="2025-05-10T00:49:36.958884599Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:49:36.959029 env[1711]: time="2025-05-10T00:49:36.958991463Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:36.959319 env[1711]: time="2025-05-10T00:49:36.959292014Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:49:36.959533 env[1711]: time="2025-05-10T00:49:36.959504937Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:49:36.959583 env[1711]: time="2025-05-10T00:49:36.959535370Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:49:36.959624 env[1711]: time="2025-05-10T00:49:36.959603816Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:49:36.959677 env[1711]: time="2025-05-10T00:49:36.959621708Z" level=info msg="metadata content store policy set" policy=shared May 10 00:49:36.970742 env[1711]: time="2025-05-10T00:49:36.970680591Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:49:36.970878 env[1711]: time="2025-05-10T00:49:36.970755984Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:49:36.970878 env[1711]: time="2025-05-10T00:49:36.970777545Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:49:36.970878 env[1711]: time="2025-05-10T00:49:36.970833989Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:49:36.970878 env[1711]: time="2025-05-10T00:49:36.970856068Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.970926224Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.970948577Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.970971204Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.970991998Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.971011424Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.971033220Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971093 env[1711]: time="2025-05-10T00:49:36.971051704Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:49:36.971340 env[1711]: time="2025-05-10T00:49:36.971191362Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:49:36.971340 env[1711]: time="2025-05-10T00:49:36.971293295Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:49:36.971846 env[1711]: time="2025-05-10T00:49:36.971821849Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:49:36.971914 env[1711]: time="2025-05-10T00:49:36.971873810Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:49:36.971914 env[1711]: time="2025-05-10T00:49:36.971896164Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:49:36.972001 env[1711]: time="2025-05-10T00:49:36.971971419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972001 env[1711]: time="2025-05-10T00:49:36.971991478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972108 env[1711]: time="2025-05-10T00:49:36.972080016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972155 env[1711]: time="2025-05-10T00:49:36.972114527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972155 env[1711]: time="2025-05-10T00:49:36.972134215Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972229 env[1711]: time="2025-05-10T00:49:36.972155340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972229 env[1711]: time="2025-05-10T00:49:36.972174507Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972229 env[1711]: time="2025-05-10T00:49:36.972192727Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972229 env[1711]: time="2025-05-10T00:49:36.972214089Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:49:36.972389 env[1711]: time="2025-05-10T00:49:36.972372128Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972432 env[1711]: time="2025-05-10T00:49:36.972392988Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972432 env[1711]: time="2025-05-10T00:49:36.972412673Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:49:36.972511 env[1711]: time="2025-05-10T00:49:36.972431630Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:49:36.972511 env[1711]: time="2025-05-10T00:49:36.972454226Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:49:36.972511 env[1711]: time="2025-05-10T00:49:36.972473401Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:49:36.972511 env[1711]: time="2025-05-10T00:49:36.972498414Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:49:36.972661 env[1711]: time="2025-05-10T00:49:36.972543167Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:49:36.973956 env[1711]: time="2025-05-10T00:49:36.973873082Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:49:36.976925 env[1711]: time="2025-05-10T00:49:36.973965518Z" level=info msg="Connect containerd service" May 10 00:49:36.976925 env[1711]: time="2025-05-10T00:49:36.974017610Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:49:36.979888 env[1711]: time="2025-05-10T00:49:36.977601825Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:49:36.979888 env[1711]: time="2025-05-10T00:49:36.977948018Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:49:36.979888 env[1711]: time="2025-05-10T00:49:36.978001094Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:49:36.978166 systemd[1]: Started containerd.service. May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994052977Z" level=info msg="containerd successfully booted in 0.462585s" May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994090271Z" level=info msg="Start subscribing containerd event" May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994176898Z" level=info msg="Start recovering state" May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994311935Z" level=info msg="Start event monitor" May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994337254Z" level=info msg="Start snapshots syncer" May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994373894Z" level=info msg="Start cni network conf syncer for default" May 10 00:49:36.996089 env[1711]: time="2025-05-10T00:49:36.994386831Z" level=info msg="Start streaming server" May 10 00:49:37.288653 coreos-metadata[1693]: May 10 00:49:37.288 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 May 10 00:49:37.306803 coreos-metadata[1693]: May 10 00:49:37.305 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 May 10 00:49:37.319056 coreos-metadata[1693]: May 10 00:49:37.318 INFO Fetch successful May 10 00:49:37.319223 coreos-metadata[1693]: May 10 00:49:37.319 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 00:49:37.319956 coreos-metadata[1693]: May 10 00:49:37.319 INFO Fetch successful May 10 00:49:37.323830 unknown[1693]: wrote ssh authorized keys file for user: core May 10 00:49:37.349187 update-ssh-keys[1880]: Updated "/home/core/.ssh/authorized_keys" May 10 00:49:37.349751 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:49:37.437751 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Create new startup processor May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [LongRunningPluginsManager] registered plugins: {} May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing bookkeeping folders May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO removing the completed state files May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing bookkeeping folders for long running plugins May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing replies folder for MDS reply requests that couldn't reach the service May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing healthcheck folders for long running plugins May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing locations for inventory plugin May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing default location for custom inventory May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing default location for file inventory May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Initializing default location for role inventory May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Init the cloudwatchlogs publisher May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:downloadContent May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:softwareInventory May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:configureDocker May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:configurePackage May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:refreshAssociation May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:runDocument May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:runPowerShellScript May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:updateSsmAgent May 10 00:49:37.439549 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform independent plugin aws:runDockerAction May 10 00:49:37.440376 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Successfully loaded platform dependent plugin aws:runShellScript May 10 00:49:37.440376 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 May 10 00:49:37.440376 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO OS: linux, Arch: amd64 May 10 00:49:37.441290 amazon-ssm-agent[1750]: datastore file /var/lib/amazon/ssm/i-02e7615168c6ff8e6/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute May 10 00:49:37.538909 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] Starting document processing engine... May 10 00:49:37.632918 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [EngineProcessor] Starting May 10 00:49:37.727239 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing May 10 00:49:37.821795 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] Starting message polling May 10 00:49:37.841504 tar[1710]: linux-amd64/README.md May 10 00:49:37.848883 systemd[1]: Finished prepare-helm.service. May 10 00:49:37.916468 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] Starting send replies to MDS May 10 00:49:38.011400 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [instanceID=i-02e7615168c6ff8e6] Starting association polling May 10 00:49:38.106507 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting May 10 00:49:38.118555 locksmithd[1755]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:49:38.201769 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [Association] Launching response handler May 10 00:49:38.297253 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing May 10 00:49:38.392998 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service May 10 00:49:38.488852 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized May 10 00:49:38.584943 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [HealthCheck] HealthCheck reporting agent health. May 10 00:49:38.681286 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] Starting session document processing engine... May 10 00:49:38.777708 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] [EngineProcessor] Starting May 10 00:49:38.874763 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. May 10 00:49:38.972521 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-02e7615168c6ff8e6, requestId: c714b65e-9a5e-46cb-bec9-d31bf2df38bd May 10 00:49:38.980941 systemd[1]: Started kubelet.service. May 10 00:49:39.070600 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [OfflineService] Starting document processing engine... May 10 00:49:39.166899 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [OfflineService] [EngineProcessor] Starting May 10 00:49:39.264346 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [OfflineService] [EngineProcessor] Initial processing May 10 00:49:39.362017 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [OfflineService] Starting message polling May 10 00:49:39.459875 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [OfflineService] Starting send replies to MDS May 10 00:49:39.557956 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [LongRunningPluginsManager] starting long running plugin manager May 10 00:49:39.609079 sshd_keygen[1716]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:49:39.638599 systemd[1]: Finished sshd-keygen.service. May 10 00:49:39.640843 systemd[1]: Starting issuegen.service... May 10 00:49:39.643516 systemd[1]: Started sshd@0-172.31.28.58:22-139.178.89.65:50008.service. May 10 00:49:39.649480 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:49:39.649653 systemd[1]: Finished issuegen.service. May 10 00:49:39.652517 systemd[1]: Starting systemd-user-sessions.service... May 10 00:49:39.656100 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute May 10 00:49:39.664112 systemd[1]: Finished systemd-user-sessions.service. May 10 00:49:39.667059 systemd[1]: Started getty@tty1.service. May 10 00:49:39.669899 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:49:39.672008 systemd[1]: Reached target getty.target. May 10 00:49:39.673939 systemd[1]: Reached target multi-user.target. May 10 00:49:39.676791 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:49:39.690233 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:49:39.690445 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:49:39.691672 systemd[1]: Startup finished in 580ms (kernel) + 6.034s (initrd) + 10.338s (userspace) = 16.953s. May 10 00:49:39.754525 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] listening reply. May 10 00:49:39.853236 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck May 10 00:49:39.863370 sshd[1905]: Accepted publickey for core from 139.178.89.65 port 50008 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:39.865659 sshd[1905]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:39.883414 systemd[1]: Created slice user-500.slice. May 10 00:49:39.885402 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:49:39.888589 systemd-logind[1701]: New session 1 of user core. May 10 00:49:39.895866 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:49:39.897517 systemd[1]: Starting user@500.service... May 10 00:49:39.902121 (systemd)[1914]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:39.952202 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [StartupProcessor] Executing startup processor tasks May 10 00:49:40.021635 systemd[1914]: Queued start job for default target default.target. May 10 00:49:40.022549 systemd[1914]: Reached target paths.target. May 10 00:49:40.022571 systemd[1914]: Reached target sockets.target. May 10 00:49:40.022584 systemd[1914]: Reached target timers.target. May 10 00:49:40.022596 systemd[1914]: Reached target basic.target. May 10 00:49:40.022700 systemd[1]: Started user@500.service. May 10 00:49:40.023603 systemd[1]: Started session-1.scope. May 10 00:49:40.024782 systemd[1914]: Reached target default.target. May 10 00:49:40.024927 systemd[1914]: Startup finished in 114ms. May 10 00:49:40.051286 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running May 10 00:49:40.151114 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk May 10 00:49:40.164888 systemd[1]: Started sshd@1-172.31.28.58:22-139.178.89.65:50014.service. May 10 00:49:40.166247 kubelet[1891]: E0510 00:49:40.166212 1891 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:49:40.172310 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:49:40.172438 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:49:40.172674 systemd[1]: kubelet.service: Consumed 1.224s CPU time. May 10 00:49:40.250419 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.7 May 10 00:49:40.327648 sshd[1923]: Accepted publickey for core from 139.178.89.65 port 50014 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:40.329107 sshd[1923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:40.333736 systemd-logind[1701]: New session 2 of user core. May 10 00:49:40.334163 systemd[1]: Started session-2.scope. May 10 00:49:40.350009 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-02e7615168c6ff8e6?role=subscribe&stream=input May 10 00:49:40.449897 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-02e7615168c6ff8e6?role=subscribe&stream=input May 10 00:49:40.463411 sshd[1923]: pam_unix(sshd:session): session closed for user core May 10 00:49:40.466124 systemd[1]: sshd@1-172.31.28.58:22-139.178.89.65:50014.service: Deactivated successfully. May 10 00:49:40.466849 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:49:40.467433 systemd-logind[1701]: Session 2 logged out. Waiting for processes to exit. May 10 00:49:40.468425 systemd-logind[1701]: Removed session 2. May 10 00:49:40.489340 systemd[1]: Started sshd@2-172.31.28.58:22-139.178.89.65:50026.service. May 10 00:49:40.549818 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] Starting receiving message from control channel May 10 00:49:40.648883 sshd[1929]: Accepted publickey for core from 139.178.89.65 port 50026 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:40.650053 amazon-ssm-agent[1750]: 2025-05-10 00:49:37 INFO [MessageGatewayService] [EngineProcessor] Initial processing May 10 00:49:40.650279 sshd[1929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:40.655250 systemd-logind[1701]: New session 3 of user core. May 10 00:49:40.655705 systemd[1]: Started session-3.scope. May 10 00:49:40.779229 sshd[1929]: pam_unix(sshd:session): session closed for user core May 10 00:49:40.782106 systemd[1]: sshd@2-172.31.28.58:22-139.178.89.65:50026.service: Deactivated successfully. May 10 00:49:40.782791 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:49:40.783323 systemd-logind[1701]: Session 3 logged out. Waiting for processes to exit. May 10 00:49:40.784275 systemd-logind[1701]: Removed session 3. May 10 00:49:40.804465 systemd[1]: Started sshd@3-172.31.28.58:22-139.178.89.65:50040.service. May 10 00:49:40.963911 sshd[1935]: Accepted publickey for core from 139.178.89.65 port 50040 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:40.965347 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:40.969801 systemd-logind[1701]: New session 4 of user core. May 10 00:49:40.970212 systemd[1]: Started session-4.scope. May 10 00:49:41.099786 sshd[1935]: pam_unix(sshd:session): session closed for user core May 10 00:49:41.102559 systemd[1]: sshd@3-172.31.28.58:22-139.178.89.65:50040.service: Deactivated successfully. May 10 00:49:41.103256 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:49:41.104110 systemd-logind[1701]: Session 4 logged out. Waiting for processes to exit. May 10 00:49:41.105034 systemd-logind[1701]: Removed session 4. May 10 00:49:41.124940 systemd[1]: Started sshd@4-172.31.28.58:22-139.178.89.65:50042.service. May 10 00:49:41.280422 sshd[1941]: Accepted publickey for core from 139.178.89.65 port 50042 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:41.281889 sshd[1941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:41.286509 systemd-logind[1701]: New session 5 of user core. May 10 00:49:41.287109 systemd[1]: Started session-5.scope. May 10 00:49:41.433138 sudo[1944]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:49:41.433388 sudo[1944]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:41.440979 dbus-daemon[1694]: Н\u0015fxU: received setenforce notice (enforcing=-702239152) May 10 00:49:41.442976 sudo[1944]: pam_unix(sudo:session): session closed for user root May 10 00:49:41.466855 sshd[1941]: pam_unix(sshd:session): session closed for user core May 10 00:49:41.470636 systemd[1]: sshd@4-172.31.28.58:22-139.178.89.65:50042.service: Deactivated successfully. May 10 00:49:41.471593 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:49:41.472362 systemd-logind[1701]: Session 5 logged out. Waiting for processes to exit. May 10 00:49:41.473400 systemd-logind[1701]: Removed session 5. May 10 00:49:41.493035 systemd[1]: Started sshd@5-172.31.28.58:22-139.178.89.65:50048.service. May 10 00:49:41.653196 sshd[1948]: Accepted publickey for core from 139.178.89.65 port 50048 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:41.654653 sshd[1948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:41.659775 systemd[1]: Started session-6.scope. May 10 00:49:41.660207 systemd-logind[1701]: New session 6 of user core. May 10 00:49:41.766151 sudo[1952]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:49:41.766383 sudo[1952]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:41.769656 sudo[1952]: pam_unix(sudo:session): session closed for user root May 10 00:49:41.775351 sudo[1951]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:49:41.775689 sudo[1951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:41.787417 systemd[1]: Stopping audit-rules.service... May 10 00:49:41.805741 kernel: kauditd_printk_skb: 216 callbacks suppressed May 10 00:49:41.805896 kernel: audit: type=1305 audit(1746838181.788:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:49:41.805936 kernel: audit: type=1300 audit(1746838181.788:196): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd34caa820 a2=420 a3=0 items=0 ppid=1 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:41.805969 kernel: audit: type=1327 audit(1746838181.788:196): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:49:41.805998 kernel: audit: type=1131 audit(1746838181.790:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.788000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:49:41.788000 audit[1955]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd34caa820 a2=420 a3=0 items=0 ppid=1 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:41.788000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:49:41.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.790605 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:49:41.806508 auditctl[1955]: No rules May 10 00:49:41.790832 systemd[1]: Stopped audit-rules.service. May 10 00:49:41.793457 systemd[1]: Starting audit-rules.service... May 10 00:49:41.817865 augenrules[1972]: No rules May 10 00:49:41.822774 kernel: audit: type=1130 audit(1746838181.818:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.818496 systemd[1]: Finished audit-rules.service. May 10 00:49:41.822734 sudo[1951]: pam_unix(sudo:session): session closed for user root May 10 00:49:41.822000 audit[1951]: USER_END pid=1951 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:41.827747 kernel: audit: type=1106 audit(1746838181.822:199): pid=1951 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:41.827827 kernel: audit: type=1104 audit(1746838181.822:200): pid=1951 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:41.822000 audit[1951]: CRED_DISP pid=1951 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:41.845795 sshd[1948]: pam_unix(sshd:session): session closed for user core May 10 00:49:41.846000 audit[1948]: USER_END pid=1948 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:41.849551 systemd[1]: sshd@5-172.31.28.58:22-139.178.89.65:50048.service: Deactivated successfully. May 10 00:49:41.850455 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:49:41.846000 audit[1948]: CRED_DISP pid=1948 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:41.852131 systemd-logind[1701]: Session 6 logged out. Waiting for processes to exit. May 10 00:49:41.853538 systemd-logind[1701]: Removed session 6. May 10 00:49:41.856467 kernel: audit: type=1106 audit(1746838181.846:201): pid=1948 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:41.856557 kernel: audit: type=1104 audit(1746838181.846:202): pid=1948 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:41.856591 kernel: audit: type=1131 audit(1746838181.846:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.58:22-139.178.89.65:50048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.28.58:22-139.178.89.65:50048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.58:22-139.178.89.65:50050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:41.869756 systemd[1]: Started sshd@6-172.31.28.58:22-139.178.89.65:50050.service. May 10 00:49:42.020000 audit[1978]: USER_ACCT pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:42.022497 sshd[1978]: Accepted publickey for core from 139.178.89.65 port 50050 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:49:42.021000 audit[1978]: CRED_ACQ pid=1978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:42.021000 audit[1978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc93763ac0 a2=3 a3=0 items=0 ppid=1 pid=1978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:49:42.022991 sshd[1978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:42.028178 systemd[1]: Started session-7.scope. May 10 00:49:42.028519 systemd-logind[1701]: New session 7 of user core. May 10 00:49:42.033000 audit[1978]: USER_START pid=1978 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:42.035000 audit[1980]: CRED_ACQ pid=1980 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:49:42.128000 audit[1981]: USER_ACCT pid=1981 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:42.128000 audit[1981]: CRED_REFR pid=1981 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:42.129459 sudo[1981]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:49:42.129693 sudo[1981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:49:42.130000 audit[1981]: USER_START pid=1981 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:42.160042 systemd[1]: Starting docker.service... May 10 00:49:42.203632 env[1991]: time="2025-05-10T00:49:42.203579370Z" level=info msg="Starting up" May 10 00:49:42.205766 env[1991]: time="2025-05-10T00:49:42.205695172Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:49:42.206152 env[1991]: time="2025-05-10T00:49:42.205911794Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:49:42.206257 env[1991]: time="2025-05-10T00:49:42.206242290Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:49:42.206314 env[1991]: time="2025-05-10T00:49:42.206304952Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:49:42.208353 env[1991]: time="2025-05-10T00:49:42.208335555Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:49:42.208445 env[1991]: time="2025-05-10T00:49:42.208435088Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:49:42.208507 env[1991]: time="2025-05-10T00:49:42.208496329Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:49:42.208547 env[1991]: time="2025-05-10T00:49:42.208539574Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:49:42.215806 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3264115060-merged.mount: Deactivated successfully. May 10 00:49:42.269840 env[1991]: time="2025-05-10T00:49:42.269790891Z" level=info msg="Loading containers: start." May 10 00:49:42.371000 audit[2021]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2021 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.371000 audit[2021]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff4c771590 a2=0 a3=7fff4c77157c items=0 ppid=1991 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.371000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:49:42.375000 audit[2023]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2023 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.375000 audit[2023]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff4a355650 a2=0 a3=7fff4a35563c items=0 ppid=1991 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.375000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:49:42.377000 audit[2025]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2025 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.377000 audit[2025]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa3e3db50 a2=0 a3=7fffa3e3db3c items=0 ppid=1991 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.377000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:49:42.379000 audit[2027]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2027 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.379000 audit[2027]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeead3eec0 a2=0 a3=7ffeead3eeac items=0 ppid=1991 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:49:42.382000 audit[2029]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2029 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.382000 audit[2029]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd23e4f710 a2=0 a3=7ffd23e4f6fc items=0 ppid=1991 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.382000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:49:42.401000 audit[2034]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2034 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.401000 audit[2034]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc40a20750 a2=0 a3=7ffc40a2073c items=0 ppid=1991 pid=2034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:49:42.422000 audit[2036]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2036 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.422000 audit[2036]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdaa159b90 a2=0 a3=7ffdaa159b7c items=0 ppid=1991 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.422000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:49:42.424000 audit[2038]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2038 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.424000 audit[2038]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcb09e6d70 a2=0 a3=7ffcb09e6d5c items=0 ppid=1991 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:49:42.426000 audit[2040]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2040 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.426000 audit[2040]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff981c8060 a2=0 a3=7fff981c804c items=0 ppid=1991 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:42.442000 audit[2044]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2044 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.442000 audit[2044]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff5c2cca20 a2=0 a3=7fff5c2cca0c items=0 ppid=1991 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:42.447000 audit[2045]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2045 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.447000 audit[2045]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc8ffcbf50 a2=0 a3=7ffc8ffcbf3c items=0 ppid=1991 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.447000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:42.481745 kernel: Initializing XFRM netlink socket May 10 00:49:42.532207 env[1991]: time="2025-05-10T00:49:42.532077538Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:49:42.533018 (udev-worker)[2001]: Network interface NamePolicy= disabled on kernel command line. May 10 00:49:42.577000 audit[2053]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.577000 audit[2053]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc0b1f4550 a2=0 a3=7ffc0b1f453c items=0 ppid=1991 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.577000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:49:42.589000 audit[2056]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2056 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.589000 audit[2056]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcb1e96640 a2=0 a3=7ffcb1e9662c items=0 ppid=1991 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:49:42.593000 audit[2059]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2059 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.593000 audit[2059]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9cc44fe0 a2=0 a3=7fff9cc44fcc items=0 ppid=1991 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:49:42.596000 audit[2061]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2061 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.596000 audit[2061]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc3e24c8e0 a2=0 a3=7ffc3e24c8cc items=0 ppid=1991 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.596000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:49:42.598000 audit[2063]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2063 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.598000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdbd310b50 a2=0 a3=7ffdbd310b3c items=0 ppid=1991 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:49:42.600000 audit[2065]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.600000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff6905b960 a2=0 a3=7fff6905b94c items=0 ppid=1991 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:49:42.602000 audit[2067]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2067 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.602000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd980ae090 a2=0 a3=7ffd980ae07c items=0 ppid=1991 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:49:42.611000 audit[2070]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.611000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcddf55f30 a2=0 a3=7ffcddf55f1c items=0 ppid=1991 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:49:42.614000 audit[2072]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2072 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.614000 audit[2072]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffda0808770 a2=0 a3=7ffda080875c items=0 ppid=1991 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:49:42.616000 audit[2074]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2074 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.616000 audit[2074]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd6a86ac90 a2=0 a3=7ffd6a86ac7c items=0 ppid=1991 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:49:42.618000 audit[2076]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.618000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa2f77a70 a2=0 a3=7fffa2f77a5c items=0 ppid=1991 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:49:42.619940 systemd-networkd[1442]: docker0: Link UP May 10 00:49:42.637000 audit[2080]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.637000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff70ef4f00 a2=0 a3=7fff70ef4eec items=0 ppid=1991 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.637000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:42.643000 audit[2081]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:42.643000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffddbc037d0 a2=0 a3=7ffddbc037bc items=0 ppid=1991 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:42.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:49:42.644335 env[1991]: time="2025-05-10T00:49:42.644303296Z" level=info msg="Loading containers: done." May 10 00:49:42.655738 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck865719614-merged.mount: Deactivated successfully. May 10 00:49:42.677897 env[1991]: time="2025-05-10T00:49:42.677853496Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:49:42.678098 env[1991]: time="2025-05-10T00:49:42.678035619Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:49:42.678161 env[1991]: time="2025-05-10T00:49:42.678139539Z" level=info msg="Daemon has completed initialization" May 10 00:49:42.721025 systemd[1]: Started docker.service. May 10 00:49:42.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:42.728479 env[1991]: time="2025-05-10T00:49:42.728417811Z" level=info msg="API listen on /run/docker.sock" May 10 00:49:43.946182 env[1711]: time="2025-05-10T00:49:43.946137452Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\"" May 10 00:49:44.479163 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount982594505.mount: Deactivated successfully. May 10 00:49:45.957340 env[1711]: time="2025-05-10T00:49:45.957284749Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:45.963125 env[1711]: time="2025-05-10T00:49:45.963080321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:45.967533 env[1711]: time="2025-05-10T00:49:45.967489716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:45.970287 env[1711]: time="2025-05-10T00:49:45.970245731Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.4\" returns image reference \"sha256:1c20c8797e48698afa3380793df2f1fb260e3209df72d8e864e1bc73af8336e5\"" May 10 00:49:45.970913 env[1711]: time="2025-05-10T00:49:45.970882146Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:631c6cc78b2862be4fed7df3384a643ef7297eebadae22e8ef9cbe2e19b6386f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:45.971065 env[1711]: time="2025-05-10T00:49:45.971047881Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\"" May 10 00:49:47.545415 env[1711]: time="2025-05-10T00:49:47.545361486Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.547833 env[1711]: time="2025-05-10T00:49:47.547789321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.549867 env[1711]: time="2025-05-10T00:49:47.549838130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.551318 env[1711]: time="2025-05-10T00:49:47.551287254Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:25e29187ea66f0ff9b9a00114849c3a30b649005c900a8b2a69e3f3fa56448fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:47.552578 env[1711]: time="2025-05-10T00:49:47.552334981Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.4\" returns image reference \"sha256:4db5364cd5509e0fc8e9f821fbc4b31ed79d4c9ae21809d22030ad67d530a61a\"" May 10 00:49:47.553212 env[1711]: time="2025-05-10T00:49:47.553186534Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\"" May 10 00:49:48.872519 env[1711]: time="2025-05-10T00:49:48.872455091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:48.874432 env[1711]: time="2025-05-10T00:49:48.874388621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:48.876496 env[1711]: time="2025-05-10T00:49:48.876456164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:48.878300 env[1711]: time="2025-05-10T00:49:48.878265988Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09c55f8dac59a4b8e5e354140f5a4bdd6fa9bd95c42d6bcba6782ed37c31b5a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:48.879592 env[1711]: time="2025-05-10T00:49:48.879551390Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.4\" returns image reference \"sha256:70a252485ed1f2e8332b6f0a5f8f57443bfbc3c480228f8dcd82ad5ab5cc4000\"" May 10 00:49:48.881161 env[1711]: time="2025-05-10T00:49:48.881132962Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\"" May 10 00:49:49.929289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1252396030.mount: Deactivated successfully. May 10 00:49:50.259947 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:49:50.260248 systemd[1]: Stopped kubelet.service. May 10 00:49:50.260323 systemd[1]: kubelet.service: Consumed 1.224s CPU time. May 10 00:49:50.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.263058 kernel: kauditd_printk_skb: 84 callbacks suppressed May 10 00:49:50.263137 kernel: audit: type=1130 audit(1746838190.259:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.269617 kernel: audit: type=1131 audit(1746838190.259:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.270045 systemd[1]: Starting kubelet.service... May 10 00:49:50.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.567263 systemd[1]: Started kubelet.service. May 10 00:49:50.571812 kernel: audit: type=1130 audit(1746838190.566:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:50.648380 kubelet[2120]: E0510 00:49:50.648336 2120 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:49:50.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:50.653053 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:49:50.653222 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:49:50.657749 kernel: audit: type=1131 audit(1746838190.652:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:50.711587 env[1711]: time="2025-05-10T00:49:50.711532255Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.713784 env[1711]: time="2025-05-10T00:49:50.713745295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.716522 env[1711]: time="2025-05-10T00:49:50.716489057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.717984 env[1711]: time="2025-05-10T00:49:50.717948842Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:152638222ecf265eb8e5352e3c50e8fc520994e8ffcff1ee1490c975f7fc2b36,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.718489 env[1711]: time="2025-05-10T00:49:50.718456534Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.4\" returns image reference \"sha256:608f0c8bf7f9651ca79f170235ea5eefb978a0c1da132e7477a88ad37d171ad3\"" May 10 00:49:50.718990 env[1711]: time="2025-05-10T00:49:50.718968797Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 10 00:49:51.216783 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3331121072.mount: Deactivated successfully. May 10 00:49:52.072553 amazon-ssm-agent[1750]: 2025-05-10 00:49:52 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. May 10 00:49:52.194219 env[1711]: time="2025-05-10T00:49:52.194152553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.196136 env[1711]: time="2025-05-10T00:49:52.196086896Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.198066 env[1711]: time="2025-05-10T00:49:52.198034861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.199892 env[1711]: time="2025-05-10T00:49:52.199863615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.200792 env[1711]: time="2025-05-10T00:49:52.200759353Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 10 00:49:52.201360 env[1711]: time="2025-05-10T00:49:52.201341437Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 00:49:52.671169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1451019694.mount: Deactivated successfully. May 10 00:49:52.676195 env[1711]: time="2025-05-10T00:49:52.676126830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.679697 env[1711]: time="2025-05-10T00:49:52.679655806Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.681269 env[1711]: time="2025-05-10T00:49:52.681235874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.682619 env[1711]: time="2025-05-10T00:49:52.682587299Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.683172 env[1711]: time="2025-05-10T00:49:52.683138629Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 00:49:52.683874 env[1711]: time="2025-05-10T00:49:52.683845656Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 10 00:49:53.199040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2623390823.mount: Deactivated successfully. May 10 00:49:55.463570 env[1711]: time="2025-05-10T00:49:55.463503493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:55.465742 env[1711]: time="2025-05-10T00:49:55.465687001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:55.467546 env[1711]: time="2025-05-10T00:49:55.467514036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:55.469906 env[1711]: time="2025-05-10T00:49:55.469867039Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:55.470801 env[1711]: time="2025-05-10T00:49:55.470752890Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" May 10 00:49:58.446993 systemd[1]: Stopped kubelet.service. May 10 00:49:58.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.454625 kernel: audit: type=1130 audit(1746838198.447:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.454774 kernel: audit: type=1131 audit(1746838198.450:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:58.453868 systemd[1]: Starting kubelet.service... May 10 00:49:58.489998 systemd[1]: Reloading. May 10 00:49:58.598353 /usr/lib/systemd/system-generators/torcx-generator[2171]: time="2025-05-10T00:49:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:58.598396 /usr/lib/systemd/system-generators/torcx-generator[2171]: time="2025-05-10T00:49:58Z" level=info msg="torcx already run" May 10 00:49:58.732780 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:58.732807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:58.759939 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:58.865463 kernel: audit: type=1400 audit(1746838198.858:244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865601 kernel: audit: type=1400 audit(1746838198.858:245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.871950 kernel: audit: type=1400 audit(1746838198.858:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.881536 kernel: audit: type=1400 audit(1746838198.858:247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.881635 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:49:58.895255 kernel: audit: type=1400 audit(1746838198.858:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.895389 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:49:58.895433 kernel: audit: backlog limit exceeded May 10 00:49:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit: BPF prog-id=43 op=LOAD May 10 00:49:58.864000 audit: BPF prog-id=24 op=UNLOAD May 10 00:49:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.864000 audit: BPF prog-id=44 op=LOAD May 10 00:49:58.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.865000 audit: BPF prog-id=45 op=LOAD May 10 00:49:58.865000 audit: BPF prog-id=25 op=UNLOAD May 10 00:49:58.865000 audit: BPF prog-id=26 op=UNLOAD May 10 00:49:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.869000 audit: BPF prog-id=46 op=LOAD May 10 00:49:58.869000 audit: BPF prog-id=41 op=UNLOAD May 10 00:49:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.879000 audit: BPF prog-id=47 op=LOAD May 10 00:49:58.879000 audit: BPF prog-id=33 op=UNLOAD May 10 00:49:58.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.880000 audit: BPF prog-id=48 op=LOAD May 10 00:49:58.880000 audit: BPF prog-id=27 op=UNLOAD May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit: BPF prog-id=54 op=LOAD May 10 00:49:58.900000 audit: BPF prog-id=35 op=UNLOAD May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit: BPF prog-id=55 op=LOAD May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.900000 audit: BPF prog-id=56 op=LOAD May 10 00:49:58.900000 audit: BPF prog-id=36 op=UNLOAD May 10 00:49:58.900000 audit: BPF prog-id=37 op=UNLOAD May 10 00:49:58.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.901000 audit: BPF prog-id=57 op=LOAD May 10 00:49:58.901000 audit: BPF prog-id=30 op=UNLOAD May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit: BPF prog-id=58 op=LOAD May 10 00:49:58.903000 audit: BPF prog-id=34 op=UNLOAD May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit: BPF prog-id=59 op=LOAD May 10 00:49:58.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:58.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:49:58.927363 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 00:49:58.927438 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 00:49:58.927695 systemd[1]: Stopped kubelet.service. May 10 00:49:58.930264 systemd[1]: Starting kubelet.service... May 10 00:49:59.161872 systemd[1]: Started kubelet.service. May 10 00:49:59.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:59.236547 kubelet[2230]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:59.236942 kubelet[2230]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:49:59.236942 kubelet[2230]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:59.237122 kubelet[2230]: I0510 00:49:59.237085 2230 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:49:59.853894 kubelet[2230]: I0510 00:49:59.853851 2230 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:49:59.853894 kubelet[2230]: I0510 00:49:59.853883 2230 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:49:59.854412 kubelet[2230]: I0510 00:49:59.854392 2230 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:49:59.897294 kubelet[2230]: E0510 00:49:59.897255 2230 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.28.58:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:49:59.898549 kubelet[2230]: I0510 00:49:59.898507 2230 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:49:59.910414 kubelet[2230]: E0510 00:49:59.910336 2230 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:49:59.910414 kubelet[2230]: I0510 00:49:59.910400 2230 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:49:59.913049 kubelet[2230]: I0510 00:49:59.913016 2230 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:49:59.913286 kubelet[2230]: I0510 00:49:59.913250 2230 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:49:59.913490 kubelet[2230]: I0510 00:49:59.913284 2230 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-28-58","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:49:59.913490 kubelet[2230]: I0510 00:49:59.913478 2230 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:49:59.913490 kubelet[2230]: I0510 00:49:59.913487 2230 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:49:59.913764 kubelet[2230]: I0510 00:49:59.913592 2230 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:59.918801 kubelet[2230]: I0510 00:49:59.918757 2230 kubelet.go:446] "Attempting to sync node with API server" May 10 00:49:59.918801 kubelet[2230]: I0510 00:49:59.918810 2230 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:49:59.919022 kubelet[2230]: I0510 00:49:59.918843 2230 kubelet.go:352] "Adding apiserver pod source" May 10 00:49:59.919022 kubelet[2230]: I0510 00:49:59.918857 2230 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:49:59.938884 kubelet[2230]: W0510 00:49:59.938827 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.28.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-58&limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:49:59.938884 kubelet[2230]: E0510 00:49:59.938886 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.28.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-58&limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:49:59.939066 kubelet[2230]: I0510 00:49:59.938977 2230 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:49:59.939746 kubelet[2230]: I0510 00:49:59.939375 2230 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:49:59.940794 kubelet[2230]: W0510 00:49:59.940746 2230 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:49:59.941315 kubelet[2230]: W0510 00:49:59.941253 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.28.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:49:59.941315 kubelet[2230]: E0510 00:49:59.941313 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.28.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:49:59.957598 kubelet[2230]: I0510 00:49:59.957561 2230 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:49:59.957763 kubelet[2230]: I0510 00:49:59.957625 2230 server.go:1287] "Started kubelet" May 10 00:49:59.976879 kubelet[2230]: E0510 00:49:59.971097 2230 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.28.58:6443/api/v1/namespaces/default/events\": dial tcp 172.31.28.58:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-28-58.183e0416748e3e4f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-28-58,UID:ip-172-31-28-58,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-28-58,},FirstTimestamp:2025-05-10 00:49:59.957601871 +0000 UTC m=+0.790316083,LastTimestamp:2025-05-10 00:49:59.957601871 +0000 UTC m=+0.790316083,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-28-58,}" May 10 00:49:59.977209 kubelet[2230]: I0510 00:49:59.977172 2230 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:49:59.978553 kubelet[2230]: I0510 00:49:59.978488 2230 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:49:59.979000 audit[2230]: AVC avc: denied { mac_admin } for pid=2230 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:59.979000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:59.979000 audit[2230]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b51e30 a1=c000b53bd8 a2=c000b51e00 a3=25 items=0 ppid=1 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:59.980959 kubelet[2230]: I0510 00:49:59.980931 2230 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:49:59.980000 audit[2230]: AVC avc: denied { mac_admin } for pid=2230 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:59.980000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:59.980000 audit[2230]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b6cd80 a1=c000b53bf0 a2=c000b51ec0 a3=25 items=0 ppid=1 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.980000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:59.981346 kubelet[2230]: I0510 00:49:59.981328 2230 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:49:59.981514 kubelet[2230]: I0510 00:49:59.981503 2230 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:49:59.983652 kubelet[2230]: I0510 00:49:59.983630 2230 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:49:59.986189 kubelet[2230]: I0510 00:49:59.986171 2230 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:49:59.986616 kubelet[2230]: E0510 00:49:59.986595 2230 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ip-172-31-28-58\" not found" May 10 00:49:59.988000 audit[2241]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:59.988000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc88b57920 a2=0 a3=7ffc88b5790c items=0 ppid=2230 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:49:59.990000 audit[2242]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:59.990000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfd534dc0 a2=0 a3=7ffdfd534dac items=0 ppid=2230 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.991910 kubelet[2230]: I0510 00:49:59.991794 2230 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:49:59.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:49:59.992597 kubelet[2230]: I0510 00:49:59.992571 2230 server.go:490] "Adding debug handlers to kubelet server" May 10 00:49:59.994242 kubelet[2230]: I0510 00:49:59.994221 2230 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:49:59.994402 kubelet[2230]: I0510 00:49:59.994392 2230 reconciler.go:26] "Reconciler: start to sync state" May 10 00:49:59.994000 audit[2244]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:59.994000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdeeb30ef0 a2=0 a3=7ffdeeb30edc items=0 ppid=2230 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:49:59.999160 kubelet[2230]: E0510 00:49:59.999102 2230 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-58?timeout=10s\": dial tcp 172.31.28.58:6443: connect: connection refused" interval="200ms" May 10 00:49:59.999688 kubelet[2230]: W0510 00:49:59.999623 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.28.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:49:59.999000 audit[2246]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:59.999000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe51616b0 a2=0 a3=7fffe516169c items=0 ppid=2230 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:59.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:00.006683 kubelet[2230]: E0510 00:50:00.006617 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.28.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:00.007666 kubelet[2230]: I0510 00:50:00.007621 2230 factory.go:221] Registration of the systemd container factory successfully May 10 00:50:00.007874 kubelet[2230]: I0510 00:50:00.007842 2230 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:50:00.009540 kubelet[2230]: I0510 00:50:00.009513 2230 factory.go:221] Registration of the containerd container factory successfully May 10 00:50:00.017431 kubelet[2230]: E0510 00:50:00.017392 2230 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:50:00.024000 audit[2249]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:00.024000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd28877fc0 a2=0 a3=7ffd28877fac items=0 ppid=2230 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:50:00.033149 kubelet[2230]: I0510 00:50:00.033080 2230 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:50:00.034000 audit[2253]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:00.034000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe096516d0 a2=0 a3=7ffe096516bc items=0 ppid=2230 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:50:00.035000 audit[2254]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:00.035000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd30ed3290 a2=0 a3=7ffd30ed327c items=0 ppid=2230 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:50:00.037246 kubelet[2230]: I0510 00:50:00.036811 2230 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:50:00.037246 kubelet[2230]: I0510 00:50:00.037242 2230 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:50:00.037421 kubelet[2230]: I0510 00:50:00.037277 2230 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:50:00.037421 kubelet[2230]: I0510 00:50:00.037287 2230 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:50:00.037421 kubelet[2230]: E0510 00:50:00.037365 2230 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:50:00.038627 kubelet[2230]: W0510 00:50:00.038592 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.28.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:00.038752 kubelet[2230]: E0510 00:50:00.038645 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.28.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:00.038897 kubelet[2230]: I0510 00:50:00.038878 2230 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:50:00.038897 kubelet[2230]: I0510 00:50:00.038897 2230 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:50:00.038999 kubelet[2230]: I0510 00:50:00.038917 2230 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:00.040000 audit[2257]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:00.040000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef4096310 a2=0 a3=7ffef40962fc items=0 ppid=2230 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:50:00.044930 kubelet[2230]: I0510 00:50:00.044818 2230 policy_none.go:49] "None policy: Start" May 10 00:50:00.044930 kubelet[2230]: I0510 00:50:00.044848 2230 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:50:00.044930 kubelet[2230]: I0510 00:50:00.044864 2230 state_mem.go:35] "Initializing new in-memory state store" May 10 00:50:00.045000 audit[2258]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:00.045000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffaffabd0 a2=0 a3=10e3 items=0 ppid=2230 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:50:00.050000 audit[2261]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:00.050000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda5228210 a2=0 a3=7ffda52281fc items=0 ppid=2230 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:50:00.052000 audit[2260]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:00.052000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe4e63bd20 a2=0 a3=10e3 items=0 ppid=2230 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:50:00.054839 systemd[1]: Created slice kubepods.slice. May 10 00:50:00.058000 audit[2262]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:00.058000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffedfd84aa0 a2=0 a3=7ffedfd84a8c items=0 ppid=2230 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:50:00.082417 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:50:00.093039 kubelet[2230]: E0510 00:50:00.092517 2230 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"ip-172-31-28-58\" not found" May 10 00:50:00.118562 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:50:00.138305 kubelet[2230]: E0510 00:50:00.138264 2230 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 10 00:50:00.150837 kubelet[2230]: I0510 00:50:00.150664 2230 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:50:00.150000 audit[2230]: AVC avc: denied { mac_admin } for pid=2230 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:00.150000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:00.150000 audit[2230]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dbeab0 a1=c000d95d58 a2=c000dbea80 a3=25 items=0 ppid=1 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:00.151774 kubelet[2230]: I0510 00:50:00.151746 2230 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:50:00.152225 kubelet[2230]: I0510 00:50:00.152208 2230 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:50:00.153792 kubelet[2230]: I0510 00:50:00.152393 2230 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:50:00.154698 kubelet[2230]: I0510 00:50:00.154107 2230 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:50:00.159257 kubelet[2230]: E0510 00:50:00.159231 2230 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:50:00.159532 kubelet[2230]: E0510 00:50:00.159498 2230 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-28-58\" not found" May 10 00:50:00.200870 kubelet[2230]: E0510 00:50:00.200822 2230 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-58?timeout=10s\": dial tcp 172.31.28.58:6443: connect: connection refused" interval="400ms" May 10 00:50:00.255527 kubelet[2230]: I0510 00:50:00.255377 2230 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:00.255928 kubelet[2230]: E0510 00:50:00.255782 2230 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.31.28.58:6443/api/v1/nodes\": dial tcp 172.31.28.58:6443: connect: connection refused" node="ip-172-31-28-58" May 10 00:50:00.349327 systemd[1]: Created slice kubepods-burstable-podefde81869e6c96d5b743b4b20c344095.slice. May 10 00:50:00.355639 kubelet[2230]: E0510 00:50:00.355609 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:00.359487 systemd[1]: Created slice kubepods-burstable-pod66b4cc1dab465ef6b4719af3e9047530.slice. May 10 00:50:00.366348 kubelet[2230]: E0510 00:50:00.366202 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:00.368975 systemd[1]: Created slice kubepods-burstable-pod87f1b6bcf92593d480f779eb96f6c0b5.slice. May 10 00:50:00.371846 kubelet[2230]: E0510 00:50:00.371820 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:00.398394 kubelet[2230]: I0510 00:50:00.398350 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:00.398394 kubelet[2230]: I0510 00:50:00.398393 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/efde81869e6c96d5b743b4b20c344095-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-58\" (UID: \"efde81869e6c96d5b743b4b20c344095\") " pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:00.398877 kubelet[2230]: I0510 00:50:00.398855 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/efde81869e6c96d5b743b4b20c344095-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-58\" (UID: \"efde81869e6c96d5b743b4b20c344095\") " pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:00.398877 kubelet[2230]: I0510 00:50:00.398876 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:00.399001 kubelet[2230]: I0510 00:50:00.398894 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:00.399001 kubelet[2230]: I0510 00:50:00.398909 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:00.399001 kubelet[2230]: I0510 00:50:00.398924 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:00.399001 kubelet[2230]: I0510 00:50:00.398939 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/87f1b6bcf92593d480f779eb96f6c0b5-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-58\" (UID: \"87f1b6bcf92593d480f779eb96f6c0b5\") " pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:00.399001 kubelet[2230]: I0510 00:50:00.398954 2230 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/efde81869e6c96d5b743b4b20c344095-ca-certs\") pod \"kube-apiserver-ip-172-31-28-58\" (UID: \"efde81869e6c96d5b743b4b20c344095\") " pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:00.457545 kubelet[2230]: I0510 00:50:00.457492 2230 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:00.457881 kubelet[2230]: E0510 00:50:00.457827 2230 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.31.28.58:6443/api/v1/nodes\": dial tcp 172.31.28.58:6443: connect: connection refused" node="ip-172-31-28-58" May 10 00:50:00.602289 kubelet[2230]: E0510 00:50:00.602244 2230 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-58?timeout=10s\": dial tcp 172.31.28.58:6443: connect: connection refused" interval="800ms" May 10 00:50:00.657188 env[1711]: time="2025-05-10T00:50:00.657074574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-58,Uid:efde81869e6c96d5b743b4b20c344095,Namespace:kube-system,Attempt:0,}" May 10 00:50:00.668136 env[1711]: time="2025-05-10T00:50:00.667911681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-58,Uid:66b4cc1dab465ef6b4719af3e9047530,Namespace:kube-system,Attempt:0,}" May 10 00:50:00.673756 env[1711]: time="2025-05-10T00:50:00.673699388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-58,Uid:87f1b6bcf92593d480f779eb96f6c0b5,Namespace:kube-system,Attempt:0,}" May 10 00:50:00.755403 kubelet[2230]: W0510 00:50:00.755324 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.28.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-58&limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:00.755568 kubelet[2230]: E0510 00:50:00.755397 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.28.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-58&limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:00.859935 kubelet[2230]: I0510 00:50:00.859902 2230 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:00.860495 kubelet[2230]: E0510 00:50:00.860461 2230 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.31.28.58:6443/api/v1/nodes\": dial tcp 172.31.28.58:6443: connect: connection refused" node="ip-172-31-28-58" May 10 00:50:00.920245 kubelet[2230]: W0510 00:50:00.920138 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.28.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:00.920245 kubelet[2230]: E0510 00:50:00.920187 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.28.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:01.082379 kubelet[2230]: W0510 00:50:01.082281 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.28.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:01.082623 kubelet[2230]: E0510 00:50:01.082390 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.28.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:01.204550 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1162942257.mount: Deactivated successfully. May 10 00:50:01.219338 env[1711]: time="2025-05-10T00:50:01.219237256Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.231304 env[1711]: time="2025-05-10T00:50:01.231250155Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.234414 env[1711]: time="2025-05-10T00:50:01.234358501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.239488 env[1711]: time="2025-05-10T00:50:01.239428244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.249836 env[1711]: time="2025-05-10T00:50:01.248804447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.251592 env[1711]: time="2025-05-10T00:50:01.251533212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.254244 env[1711]: time="2025-05-10T00:50:01.254201633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.256616 env[1711]: time="2025-05-10T00:50:01.256572120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.260394 env[1711]: time="2025-05-10T00:50:01.260332451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.262810 env[1711]: time="2025-05-10T00:50:01.262758701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.267799 env[1711]: time="2025-05-10T00:50:01.267562471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.270933 env[1711]: time="2025-05-10T00:50:01.270885045Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:01.276162 kubelet[2230]: W0510 00:50:01.275931 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.28.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:01.276793 kubelet[2230]: E0510 00:50:01.276189 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.28.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:01.397028 env[1711]: time="2025-05-10T00:50:01.396910456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:01.397028 env[1711]: time="2025-05-10T00:50:01.396964678Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:01.397028 env[1711]: time="2025-05-10T00:50:01.396982313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:01.399725 env[1711]: time="2025-05-10T00:50:01.399378912Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d80568726ddb3eb4cb09f715f31fffa42eaafb60fd0519924f11b9b61e02b0b4 pid=2270 runtime=io.containerd.runc.v2 May 10 00:50:01.403621 kubelet[2230]: E0510 00:50:01.403562 2230 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-58?timeout=10s\": dial tcp 172.31.28.58:6443: connect: connection refused" interval="1.6s" May 10 00:50:01.443667 env[1711]: time="2025-05-10T00:50:01.443567373Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:01.443947 env[1711]: time="2025-05-10T00:50:01.443689539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:01.443947 env[1711]: time="2025-05-10T00:50:01.443745292Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:01.444071 env[1711]: time="2025-05-10T00:50:01.444017757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7 pid=2295 runtime=io.containerd.runc.v2 May 10 00:50:01.450579 env[1711]: time="2025-05-10T00:50:01.450502344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:01.451319 env[1711]: time="2025-05-10T00:50:01.451252315Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:01.451495 env[1711]: time="2025-05-10T00:50:01.451447407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:01.457765 env[1711]: time="2025-05-10T00:50:01.454185143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf pid=2305 runtime=io.containerd.runc.v2 May 10 00:50:01.537226 systemd[1]: Started cri-containerd-d80568726ddb3eb4cb09f715f31fffa42eaafb60fd0519924f11b9b61e02b0b4.scope. May 10 00:50:01.592944 systemd[1]: Started cri-containerd-ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7.scope. May 10 00:50:01.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit: BPF prog-id=61 op=LOAD May 10 00:50:01.616000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2270 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303536383732366464623365623463623039663731356633316666 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2270 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303536383732366464623365623463623039663731356633316666 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.616000 audit: BPF prog-id=62 op=LOAD May 10 00:50:01.616000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cb130 items=0 ppid=2270 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303536383732366464623365623463623039663731356633316666 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit: BPF prog-id=63 op=LOAD May 10 00:50:01.617000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cb178 items=0 ppid=2270 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303536383732366464623365623463623039663731356633316666 May 10 00:50:01.617000 audit: BPF prog-id=63 op=UNLOAD May 10 00:50:01.617000 audit: BPF prog-id=62 op=UNLOAD May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { perfmon } for pid=2288 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit[2288]: AVC avc: denied { bpf } for pid=2288 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.617000 audit: BPF prog-id=64 op=LOAD May 10 00:50:01.617000 audit[2288]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002cb588 items=0 ppid=2270 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303536383732366464623365623463623039663731356633316666 May 10 00:50:01.663502 kubelet[2230]: I0510 00:50:01.662960 2230 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:01.663502 kubelet[2230]: E0510 00:50:01.663431 2230 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.31.28.58:6443/api/v1/nodes\": dial tcp 172.31.28.58:6443: connect: connection refused" node="ip-172-31-28-58" May 10 00:50:01.685749 systemd[1]: Started cri-containerd-dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf.scope. May 10 00:50:01.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.707000 audit: BPF prog-id=65 op=LOAD May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2295 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643630313365376566316530363039653737393235383765313765 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2295 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643630313365376566316530363039653737393235383765313765 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit: BPF prog-id=66 op=LOAD May 10 00:50:01.708000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002104e0 items=0 ppid=2295 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643630313365376566316530363039653737393235383765313765 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit: BPF prog-id=67 op=LOAD May 10 00:50:01.708000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000210528 items=0 ppid=2295 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643630313365376566316530363039653737393235383765313765 May 10 00:50:01.708000 audit: BPF prog-id=67 op=UNLOAD May 10 00:50:01.708000 audit: BPF prog-id=66 op=UNLOAD May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { perfmon } for pid=2325 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit[2325]: AVC avc: denied { bpf } for pid=2325 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.708000 audit: BPF prog-id=68 op=LOAD May 10 00:50:01.708000 audit[2325]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000210938 items=0 ppid=2295 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643630313365376566316530363039653737393235383765313765 May 10 00:50:01.770918 env[1711]: time="2025-05-10T00:50:01.770852746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-28-58,Uid:efde81869e6c96d5b743b4b20c344095,Namespace:kube-system,Attempt:0,} returns sandbox id \"d80568726ddb3eb4cb09f715f31fffa42eaafb60fd0519924f11b9b61e02b0b4\"" May 10 00:50:01.791393 env[1711]: time="2025-05-10T00:50:01.791348171Z" level=info msg="CreateContainer within sandbox \"d80568726ddb3eb4cb09f715f31fffa42eaafb60fd0519924f11b9b61e02b0b4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:50:01.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit: BPF prog-id=69 op=LOAD May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2305 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461653335643735643333333338343638663037663463633765373563 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2305 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461653335643735643333333338343638663037663463633765373563 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit: BPF prog-id=70 op=LOAD May 10 00:50:01.796000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d2ff0 items=0 ppid=2305 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461653335643735643333333338343638663037663463633765373563 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.796000 audit: BPF prog-id=71 op=LOAD May 10 00:50:01.796000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d3038 items=0 ppid=2305 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461653335643735643333333338343638663037663463633765373563 May 10 00:50:01.797000 audit: BPF prog-id=71 op=UNLOAD May 10 00:50:01.797000 audit: BPF prog-id=70 op=UNLOAD May 10 00:50:01.797000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:01.797000 audit: BPF prog-id=72 op=LOAD May 10 00:50:01.797000 audit[2338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d3448 items=0 ppid=2305 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:01.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461653335643735643333333338343638663037663463633765373563 May 10 00:50:01.861580 env[1711]: time="2025-05-10T00:50:01.861520259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-28-58,Uid:66b4cc1dab465ef6b4719af3e9047530,Namespace:kube-system,Attempt:0,} returns sandbox id \"ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7\"" May 10 00:50:01.866436 env[1711]: time="2025-05-10T00:50:01.866384118Z" level=info msg="CreateContainer within sandbox \"ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:50:01.887944 env[1711]: time="2025-05-10T00:50:01.887690385Z" level=info msg="CreateContainer within sandbox \"d80568726ddb3eb4cb09f715f31fffa42eaafb60fd0519924f11b9b61e02b0b4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2f8a45ab2e0ff6eb58225e6587f685e1819cd3e9d09e2ff320689b51cc18f3b9\"" May 10 00:50:01.896401 env[1711]: time="2025-05-10T00:50:01.896349841Z" level=info msg="StartContainer for \"2f8a45ab2e0ff6eb58225e6587f685e1819cd3e9d09e2ff320689b51cc18f3b9\"" May 10 00:50:01.904710 env[1711]: time="2025-05-10T00:50:01.904658355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-28-58,Uid:87f1b6bcf92593d480f779eb96f6c0b5,Namespace:kube-system,Attempt:0,} returns sandbox id \"dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf\"" May 10 00:50:01.909033 env[1711]: time="2025-05-10T00:50:01.908971665Z" level=info msg="CreateContainer within sandbox \"dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:50:01.942953 env[1711]: time="2025-05-10T00:50:01.942892500Z" level=info msg="CreateContainer within sandbox \"ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9\"" May 10 00:50:01.943773 env[1711]: time="2025-05-10T00:50:01.943738446Z" level=info msg="StartContainer for \"9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9\"" May 10 00:50:01.961644 systemd[1]: Started cri-containerd-2f8a45ab2e0ff6eb58225e6587f685e1819cd3e9d09e2ff320689b51cc18f3b9.scope. May 10 00:50:02.023534 systemd[1]: Started cri-containerd-9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9.scope. May 10 00:50:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.036000 audit: BPF prog-id=73 op=LOAD May 10 00:50:02.037745 env[1711]: time="2025-05-10T00:50:02.037388295Z" level=info msg="CreateContainer within sandbox \"dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4\"" May 10 00:50:02.038114 env[1711]: time="2025-05-10T00:50:02.038069542Z" level=info msg="StartContainer for \"56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4\"" May 10 00:50:02.037000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2270 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386134356162326530666636656235383232356536353837663638 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2270 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386134356162326530666636656235383232356536353837663638 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.037000 audit: BPF prog-id=74 op=LOAD May 10 00:50:02.037000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000301310 items=0 ppid=2270 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386134356162326530666636656235383232356536353837663638 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit: BPF prog-id=75 op=LOAD May 10 00:50:02.038000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000301358 items=0 ppid=2270 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386134356162326530666636656235383232356536353837663638 May 10 00:50:02.038000 audit: BPF prog-id=75 op=UNLOAD May 10 00:50:02.038000 audit: BPF prog-id=74 op=UNLOAD May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { perfmon } for pid=2407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit[2407]: AVC avc: denied { bpf } for pid=2407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.038000 audit: BPF prog-id=76 op=LOAD May 10 00:50:02.038000 audit[2407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000301768 items=0 ppid=2270 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386134356162326530666636656235383232356536353837663638 May 10 00:50:02.073225 kubelet[2230]: E0510 00:50:02.073124 2230 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.31.28.58:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:02.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.112000 audit: BPF prog-id=77 op=LOAD May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2295 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366230636465633461613335653934333737613662383732366533 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2295 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366230636465633461613335653934333737613662383732366533 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit: BPF prog-id=78 op=LOAD May 10 00:50:02.113000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003891d0 items=0 ppid=2295 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366230636465633461613335653934333737613662383732366533 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit: BPF prog-id=79 op=LOAD May 10 00:50:02.113000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000389218 items=0 ppid=2295 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366230636465633461613335653934333737613662383732366533 May 10 00:50:02.113000 audit: BPF prog-id=79 op=UNLOAD May 10 00:50:02.113000 audit: BPF prog-id=78 op=UNLOAD May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.113000 audit: BPF prog-id=80 op=LOAD May 10 00:50:02.113000 audit[2424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000389628 items=0 ppid=2295 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964366230636465633461613335653934333737613662383732366533 May 10 00:50:02.136698 systemd[1]: Started cri-containerd-56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4.scope. May 10 00:50:02.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.230000 audit: BPF prog-id=81 op=LOAD May 10 00:50:02.236000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2305 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623638643134303338306630303336646565396439393137663464 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2305 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623638643134303338306630303336646565396439393137663464 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.236000 audit: BPF prog-id=82 op=LOAD May 10 00:50:02.236000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028f950 items=0 ppid=2305 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623638643134303338306630303336646565396439393137663464 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit: BPF prog-id=83 op=LOAD May 10 00:50:02.237000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028f998 items=0 ppid=2305 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623638643134303338306630303336646565396439393137663464 May 10 00:50:02.237000 audit: BPF prog-id=83 op=UNLOAD May 10 00:50:02.237000 audit: BPF prog-id=82 op=UNLOAD May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:02.237000 audit: BPF prog-id=84 op=LOAD May 10 00:50:02.237000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028fda8 items=0 ppid=2305 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:02.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623638643134303338306630303336646565396439393137663464 May 10 00:50:02.279257 env[1711]: time="2025-05-10T00:50:02.279196888Z" level=info msg="StartContainer for \"2f8a45ab2e0ff6eb58225e6587f685e1819cd3e9d09e2ff320689b51cc18f3b9\" returns successfully" May 10 00:50:02.280490 env[1711]: time="2025-05-10T00:50:02.280434447Z" level=info msg="StartContainer for \"9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9\" returns successfully" May 10 00:50:02.348884 env[1711]: time="2025-05-10T00:50:02.348821330Z" level=info msg="StartContainer for \"56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4\" returns successfully" May 10 00:50:02.474822 kubelet[2230]: W0510 00:50:02.474748 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.31.28.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-58&limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:02.475279 kubelet[2230]: E0510 00:50:02.474853 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.31.28.58:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-28-58&limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:02.887974 kubelet[2230]: W0510 00:50:02.887890 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.31.28.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:02.888160 kubelet[2230]: E0510 00:50:02.887988 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.31.28.58:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:03.004508 kubelet[2230]: E0510 00:50:03.004458 2230 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.28.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-58?timeout=10s\": dial tcp 172.31.28.58:6443: connect: connection refused" interval="3.2s" May 10 00:50:03.055208 kubelet[2230]: W0510 00:50:03.055131 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.31.28.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:03.055388 kubelet[2230]: E0510 00:50:03.055219 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.31.28.58:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:03.083042 kubelet[2230]: W0510 00:50:03.082968 2230 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.31.28.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.28.58:6443: connect: connection refused May 10 00:50:03.083202 kubelet[2230]: E0510 00:50:03.083053 2230 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.31.28.58:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.28.58:6443: connect: connection refused" logger="UnhandledError" May 10 00:50:03.087990 kubelet[2230]: E0510 00:50:03.087855 2230 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.28.58:6443/api/v1/namespaces/default/events\": dial tcp 172.31.28.58:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-28-58.183e0416748e3e4f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-28-58,UID:ip-172-31-28-58,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-28-58,},FirstTimestamp:2025-05-10 00:49:59.957601871 +0000 UTC m=+0.790316083,LastTimestamp:2025-05-10 00:49:59.957601871 +0000 UTC m=+0.790316083,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-28-58,}" May 10 00:50:03.102117 kubelet[2230]: E0510 00:50:03.102083 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:03.107459 kubelet[2230]: E0510 00:50:03.107425 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:03.111520 kubelet[2230]: E0510 00:50:03.111490 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:03.265215 kubelet[2230]: I0510 00:50:03.265189 2230 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:03.265749 kubelet[2230]: E0510 00:50:03.265684 2230 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://172.31.28.58:6443/api/v1/nodes\": dial tcp 172.31.28.58:6443: connect: connection refused" node="ip-172-31-28-58" May 10 00:50:04.113619 kubelet[2230]: E0510 00:50:04.113593 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:04.114646 kubelet[2230]: E0510 00:50:04.114626 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:04.115119 kubelet[2230]: E0510 00:50:04.115103 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:04.324000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:04.327812 kernel: kauditd_printk_skb: 710 callbacks suppressed May 10 00:50:04.327959 kernel: audit: type=1400 audit(1746838204.324:515): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:04.352114 kernel: audit: type=1300 audit(1746838204.324:515): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0006f4ea0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:04.324000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0006f4ea0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:04.364060 kernel: audit: type=1327 audit(1746838204.324:515): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:04.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:04.332000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:04.387095 kernel: audit: type=1400 audit(1746838204.332:516): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:04.387232 kernel: audit: type=1300 audit(1746838204.332:516): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004d4f40 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:04.332000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004d4f40 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:04.398945 kernel: audit: type=1327 audit(1746838204.332:516): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:04.332000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:05.115360 kubelet[2230]: E0510 00:50:05.115324 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:05.115897 kubelet[2230]: E0510 00:50:05.115774 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:05.338000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.338000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c00391f170 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.355039 kernel: audit: type=1400 audit(1746838205.338:517): avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.355183 kernel: audit: type=1300 audit(1746838205.338:517): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c00391f170 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.355220 kernel: audit: type=1327 audit(1746838205.338:517): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.338000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.372914 kernel: audit: type=1400 audit(1746838205.338:518): avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.338000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0035a0ae0 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.373000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.373000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00391f500 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.380000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.380000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c003be4c80 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.380000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.381000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.381000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c003b73e00 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.383000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:05.383000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003ec81b0 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:50:05.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:50:05.876733 kubelet[2230]: E0510 00:50:05.876685 2230 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-28-58" not found May 10 00:50:06.116203 kubelet[2230]: E0510 00:50:06.116174 2230 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:06.208784 kubelet[2230]: E0510 00:50:06.208657 2230 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-28-58\" not found" node="ip-172-31-28-58" May 10 00:50:06.231065 kubelet[2230]: E0510 00:50:06.231032 2230 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ip-172-31-28-58" not found May 10 00:50:06.467309 kubelet[2230]: I0510 00:50:06.467232 2230 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:06.482573 kubelet[2230]: I0510 00:50:06.482520 2230 kubelet_node_status.go:79] "Successfully registered node" node="ip-172-31-28-58" May 10 00:50:06.482573 kubelet[2230]: E0510 00:50:06.482570 2230 kubelet_node_status.go:549] "Error updating node status, will retry" err="error getting node \"ip-172-31-28-58\": node \"ip-172-31-28-58\" not found" May 10 00:50:06.487225 kubelet[2230]: I0510 00:50:06.487197 2230 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:06.503912 kubelet[2230]: I0510 00:50:06.503880 2230 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:06.512351 kubelet[2230]: I0510 00:50:06.512310 2230 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:06.922533 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 00:50:06.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:06.935226 kubelet[2230]: I0510 00:50:06.935192 2230 apiserver.go:52] "Watching apiserver" May 10 00:50:06.940000 audit: BPF prog-id=53 op=UNLOAD May 10 00:50:06.940000 audit: BPF prog-id=52 op=UNLOAD May 10 00:50:06.940000 audit: BPF prog-id=51 op=UNLOAD May 10 00:50:06.995300 kubelet[2230]: I0510 00:50:06.995269 2230 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:50:07.641590 systemd[1]: Reloading. May 10 00:50:07.734845 /usr/lib/systemd/system-generators/torcx-generator[2532]: time="2025-05-10T00:50:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:50:07.734875 /usr/lib/systemd/system-generators/torcx-generator[2532]: time="2025-05-10T00:50:07Z" level=info msg="torcx already run" May 10 00:50:07.830723 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:50:07.830744 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:50:07.850129 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit: BPF prog-id=85 op=LOAD May 10 00:50:07.943000 audit: BPF prog-id=43 op=UNLOAD May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit: BPF prog-id=86 op=LOAD May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.943000 audit: BPF prog-id=87 op=LOAD May 10 00:50:07.943000 audit: BPF prog-id=44 op=UNLOAD May 10 00:50:07.943000 audit: BPF prog-id=45 op=UNLOAD May 10 00:50:07.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.946000 audit: BPF prog-id=88 op=LOAD May 10 00:50:07.946000 audit: BPF prog-id=46 op=UNLOAD May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit: BPF prog-id=89 op=LOAD May 10 00:50:07.949000 audit: BPF prog-id=47 op=UNLOAD May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit: BPF prog-id=90 op=LOAD May 10 00:50:07.950000 audit: BPF prog-id=48 op=UNLOAD May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit: BPF prog-id=91 op=LOAD May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.950000 audit: BPF prog-id=92 op=LOAD May 10 00:50:07.950000 audit: BPF prog-id=49 op=UNLOAD May 10 00:50:07.950000 audit: BPF prog-id=50 op=UNLOAD May 10 00:50:07.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.951000 audit: BPF prog-id=93 op=LOAD May 10 00:50:07.951000 audit: BPF prog-id=73 op=UNLOAD May 10 00:50:07.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit: BPF prog-id=94 op=LOAD May 10 00:50:07.954000 audit: BPF prog-id=69 op=UNLOAD May 10 00:50:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit: BPF prog-id=95 op=LOAD May 10 00:50:07.955000 audit: BPF prog-id=81 op=UNLOAD May 10 00:50:07.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.955000 audit: BPF prog-id=96 op=LOAD May 10 00:50:07.955000 audit: BPF prog-id=77 op=UNLOAD May 10 00:50:07.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.957000 audit: BPF prog-id=97 op=LOAD May 10 00:50:07.957000 audit: BPF prog-id=61 op=UNLOAD May 10 00:50:07.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.959000 audit: BPF prog-id=98 op=LOAD May 10 00:50:07.959000 audit: BPF prog-id=65 op=UNLOAD May 10 00:50:07.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit: BPF prog-id=99 op=LOAD May 10 00:50:07.961000 audit: BPF prog-id=54 op=UNLOAD May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit: BPF prog-id=100 op=LOAD May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.961000 audit: BPF prog-id=101 op=LOAD May 10 00:50:07.961000 audit: BPF prog-id=55 op=UNLOAD May 10 00:50:07.961000 audit: BPF prog-id=56 op=UNLOAD May 10 00:50:07.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.962000 audit: BPF prog-id=102 op=LOAD May 10 00:50:07.962000 audit: BPF prog-id=57 op=UNLOAD May 10 00:50:07.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.963000 audit: BPF prog-id=103 op=LOAD May 10 00:50:07.963000 audit: BPF prog-id=58 op=UNLOAD May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit: BPF prog-id=104 op=LOAD May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:07.965000 audit: BPF prog-id=105 op=LOAD May 10 00:50:07.965000 audit: BPF prog-id=59 op=UNLOAD May 10 00:50:07.965000 audit: BPF prog-id=60 op=UNLOAD May 10 00:50:07.983462 systemd[1]: Stopping kubelet.service... May 10 00:50:08.012260 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:50:08.014234 systemd[1]: Stopped kubelet.service. May 10 00:50:08.014321 systemd[1]: kubelet.service: Consumed 1.161s CPU time. May 10 00:50:08.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:08.017466 systemd[1]: Starting kubelet.service... May 10 00:50:09.414029 kernel: kauditd_printk_skb: 263 callbacks suppressed May 10 00:50:09.414167 kernel: audit: type=1130 audit(1746838209.408:772): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:09.408594 systemd[1]: Started kubelet.service. May 10 00:50:09.500353 kubelet[2592]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:09.500353 kubelet[2592]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 10 00:50:09.500353 kubelet[2592]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:50:09.500776 kubelet[2592]: I0510 00:50:09.500432 2592 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:50:09.511067 kubelet[2592]: I0510 00:50:09.511027 2592 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" May 10 00:50:09.511067 kubelet[2592]: I0510 00:50:09.511062 2592 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:50:09.511341 kubelet[2592]: I0510 00:50:09.511325 2592 server.go:954] "Client rotation is on, will bootstrap in background" May 10 00:50:09.512751 kubelet[2592]: I0510 00:50:09.512708 2592 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:50:09.581073 kubelet[2592]: I0510 00:50:09.580430 2592 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:50:09.585171 kubelet[2592]: E0510 00:50:09.584222 2592 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:50:09.585171 kubelet[2592]: I0510 00:50:09.584262 2592 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:50:09.586492 kubelet[2592]: I0510 00:50:09.586466 2592 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:50:09.587605 kubelet[2592]: I0510 00:50:09.586676 2592 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:50:09.587605 kubelet[2592]: I0510 00:50:09.586708 2592 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-28-58","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:50:09.587605 kubelet[2592]: I0510 00:50:09.586894 2592 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:50:09.587605 kubelet[2592]: I0510 00:50:09.586903 2592 container_manager_linux.go:304] "Creating device plugin manager" May 10 00:50:09.587918 kubelet[2592]: I0510 00:50:09.586938 2592 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:09.587918 kubelet[2592]: I0510 00:50:09.587096 2592 kubelet.go:446] "Attempting to sync node with API server" May 10 00:50:09.587918 kubelet[2592]: I0510 00:50:09.587108 2592 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:50:09.587918 kubelet[2592]: I0510 00:50:09.587156 2592 kubelet.go:352] "Adding apiserver pod source" May 10 00:50:09.587918 kubelet[2592]: I0510 00:50:09.587165 2592 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:50:09.590528 kubelet[2592]: I0510 00:50:09.590487 2592 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:50:09.591000 kubelet[2592]: I0510 00:50:09.590980 2592 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:50:09.591450 kubelet[2592]: I0510 00:50:09.591435 2592 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 10 00:50:09.591519 kubelet[2592]: I0510 00:50:09.591466 2592 server.go:1287] "Started kubelet" May 10 00:50:09.611196 kernel: audit: type=1400 audit(1746838209.601:773): avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:09.611320 kernel: audit: type=1401 audit(1746838209.601:773): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:09.601000 audit[2592]: AVC avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:09.601000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:09.611462 kubelet[2592]: I0510 00:50:09.601900 2592 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:50:09.611462 kubelet[2592]: I0510 00:50:09.601942 2592 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 10 00:50:09.611462 kubelet[2592]: I0510 00:50:09.601996 2592 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:50:09.611462 kubelet[2592]: I0510 00:50:09.608589 2592 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:50:09.601000 audit[2592]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bd72f0 a1=c000bbd290 a2=c000bd72c0 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:09.617968 kubelet[2592]: I0510 00:50:09.613215 2592 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:50:09.622972 kernel: audit: type=1300 audit(1746838209.601:773): arch=c000003e syscall=188 success=no exit=-22 a0=c000bd72f0 a1=c000bbd290 a2=c000bd72c0 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:09.624835 kubelet[2592]: I0510 00:50:09.624663 2592 server.go:490] "Adding debug handlers to kubelet server" May 10 00:50:09.626038 kubelet[2592]: I0510 00:50:09.626008 2592 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:50:09.635079 kernel: audit: type=1327 audit(1746838209.601:773): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:09.601000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:09.635263 kubelet[2592]: I0510 00:50:09.631858 2592 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:50:09.601000 audit[2592]: AVC avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:09.641199 kubelet[2592]: I0510 00:50:09.637802 2592 volume_manager.go:297] "Starting Kubelet Volume Manager" May 10 00:50:09.641199 kubelet[2592]: I0510 00:50:09.640394 2592 factory.go:221] Registration of the systemd container factory successfully May 10 00:50:09.641199 kubelet[2592]: I0510 00:50:09.640522 2592 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:50:09.641199 kubelet[2592]: E0510 00:50:09.640939 2592 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:50:09.644867 kernel: audit: type=1400 audit(1746838209.601:774): avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:09.644972 kernel: audit: type=1401 audit(1746838209.601:774): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:09.601000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:09.645036 kubelet[2592]: I0510 00:50:09.641862 2592 factory.go:221] Registration of the containerd container factory successfully May 10 00:50:09.653725 kernel: audit: type=1300 audit(1746838209.601:774): arch=c000003e syscall=188 success=no exit=-22 a0=c000c74060 a1=c000bbd2a8 a2=c000bd7380 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:09.601000 audit[2592]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c74060 a1=c000bbd2a8 a2=c000bd7380 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:09.653931 kubelet[2592]: I0510 00:50:09.651060 2592 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:50:09.653931 kubelet[2592]: I0510 00:50:09.651172 2592 reconciler.go:26] "Reconciler: start to sync state" May 10 00:50:09.601000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:09.663284 kubelet[2592]: I0510 00:50:09.663254 2592 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:50:09.663841 kernel: audit: type=1327 audit(1746838209.601:774): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:09.674994 kubelet[2592]: I0510 00:50:09.672731 2592 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:50:09.675243 kubelet[2592]: I0510 00:50:09.675223 2592 status_manager.go:227] "Starting to sync pod status with apiserver" May 10 00:50:09.675371 kubelet[2592]: I0510 00:50:09.675358 2592 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 10 00:50:09.675544 kubelet[2592]: I0510 00:50:09.675532 2592 kubelet.go:2388] "Starting kubelet main sync loop" May 10 00:50:09.675710 kubelet[2592]: E0510 00:50:09.675682 2592 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:50:09.743398 kubelet[2592]: I0510 00:50:09.743367 2592 cpu_manager.go:221] "Starting CPU manager" policy="none" May 10 00:50:09.743398 kubelet[2592]: I0510 00:50:09.743387 2592 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 10 00:50:09.743831 kubelet[2592]: I0510 00:50:09.743409 2592 state_mem.go:36] "Initialized new in-memory state store" May 10 00:50:09.743831 kubelet[2592]: I0510 00:50:09.743625 2592 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:50:09.743831 kubelet[2592]: I0510 00:50:09.743640 2592 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:50:09.743831 kubelet[2592]: I0510 00:50:09.743666 2592 policy_none.go:49] "None policy: Start" May 10 00:50:09.743831 kubelet[2592]: I0510 00:50:09.743677 2592 memory_manager.go:186] "Starting memorymanager" policy="None" May 10 00:50:09.743831 kubelet[2592]: I0510 00:50:09.743691 2592 state_mem.go:35] "Initializing new in-memory state store" May 10 00:50:09.744331 kubelet[2592]: I0510 00:50:09.743855 2592 state_mem.go:75] "Updated machine memory state" May 10 00:50:09.752570 kubelet[2592]: I0510 00:50:09.752547 2592 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:50:09.751000 audit[2592]: AVC avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:09.753038 kubelet[2592]: I0510 00:50:09.753017 2592 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:50:09.754101 kubelet[2592]: I0510 00:50:09.754081 2592 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:50:09.754242 kubelet[2592]: I0510 00:50:09.754204 2592 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:50:09.755019 kubelet[2592]: I0510 00:50:09.755000 2592 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:50:09.751000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:50:09.751000 audit[2592]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010bf380 a1=c000bbd200 a2=c0010bf350 a3=25 items=0 ppid=1 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:09.760767 kernel: audit: type=1400 audit(1746838209.751:775): avc: denied { mac_admin } for pid=2592 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:09.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:50:09.763538 kubelet[2592]: E0510 00:50:09.763513 2592 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 10 00:50:09.782381 kubelet[2592]: I0510 00:50:09.782351 2592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:09.783239 kubelet[2592]: I0510 00:50:09.783199 2592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.788251 kubelet[2592]: I0510 00:50:09.787239 2592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:09.790344 kubelet[2592]: E0510 00:50:09.790311 2592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-ip-172-31-28-58\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:09.791869 kubelet[2592]: E0510 00:50:09.791842 2592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ip-172-31-28-58\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.792594 kubelet[2592]: E0510 00:50:09.792571 2592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-28-58\" already exists" pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:09.853736 kubelet[2592]: I0510 00:50:09.852898 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/87f1b6bcf92593d480f779eb96f6c0b5-kubeconfig\") pod \"kube-scheduler-ip-172-31-28-58\" (UID: \"87f1b6bcf92593d480f779eb96f6c0b5\") " pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:09.853736 kubelet[2592]: I0510 00:50:09.852937 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/efde81869e6c96d5b743b4b20c344095-ca-certs\") pod \"kube-apiserver-ip-172-31-28-58\" (UID: \"efde81869e6c96d5b743b4b20c344095\") " pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:09.853736 kubelet[2592]: I0510 00:50:09.852956 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/efde81869e6c96d5b743b4b20c344095-k8s-certs\") pod \"kube-apiserver-ip-172-31-28-58\" (UID: \"efde81869e6c96d5b743b4b20c344095\") " pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:09.853736 kubelet[2592]: I0510 00:50:09.852971 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-ca-certs\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.853736 kubelet[2592]: I0510 00:50:09.852991 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.854049 kubelet[2592]: I0510 00:50:09.853007 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-k8s-certs\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.854049 kubelet[2592]: I0510 00:50:09.853028 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/efde81869e6c96d5b743b4b20c344095-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-28-58\" (UID: \"efde81869e6c96d5b743b4b20c344095\") " pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:09.854049 kubelet[2592]: I0510 00:50:09.853043 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-kubeconfig\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.854049 kubelet[2592]: I0510 00:50:09.853061 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/66b4cc1dab465ef6b4719af3e9047530-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-28-58\" (UID: \"66b4cc1dab465ef6b4719af3e9047530\") " pod="kube-system/kube-controller-manager-ip-172-31-28-58" May 10 00:50:09.869425 kubelet[2592]: I0510 00:50:09.869402 2592 kubelet_node_status.go:76] "Attempting to register node" node="ip-172-31-28-58" May 10 00:50:09.876781 kubelet[2592]: I0510 00:50:09.876744 2592 kubelet_node_status.go:125] "Node was previously registered" node="ip-172-31-28-58" May 10 00:50:09.876925 kubelet[2592]: I0510 00:50:09.876821 2592 kubelet_node_status.go:79] "Successfully registered node" node="ip-172-31-28-58" May 10 00:50:10.595051 kubelet[2592]: I0510 00:50:10.595017 2592 apiserver.go:52] "Watching apiserver" May 10 00:50:10.651874 kubelet[2592]: I0510 00:50:10.651802 2592 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:50:10.712872 kubelet[2592]: I0510 00:50:10.712842 2592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:10.713112 kubelet[2592]: I0510 00:50:10.713099 2592 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:10.772725 kubelet[2592]: E0510 00:50:10.772677 2592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-ip-172-31-28-58\" already exists" pod="kube-system/kube-apiserver-ip-172-31-28-58" May 10 00:50:10.773246 kubelet[2592]: E0510 00:50:10.773227 2592 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-28-58\" already exists" pod="kube-system/kube-scheduler-ip-172-31-28-58" May 10 00:50:10.827985 kubelet[2592]: I0510 00:50:10.827934 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-28-58" podStartSLOduration=4.827918218 podStartE2EDuration="4.827918218s" podCreationTimestamp="2025-05-10 00:50:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:10.81324681 +0000 UTC m=+1.387173620" watchObservedRunningTime="2025-05-10 00:50:10.827918218 +0000 UTC m=+1.401845012" May 10 00:50:10.848382 kubelet[2592]: I0510 00:50:10.848248 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-28-58" podStartSLOduration=4.848233257 podStartE2EDuration="4.848233257s" podCreationTimestamp="2025-05-10 00:50:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:10.828499415 +0000 UTC m=+1.402426226" watchObservedRunningTime="2025-05-10 00:50:10.848233257 +0000 UTC m=+1.422160069" May 10 00:50:10.861069 kubelet[2592]: I0510 00:50:10.861003 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-28-58" podStartSLOduration=4.860986603 podStartE2EDuration="4.860986603s" podCreationTimestamp="2025-05-10 00:50:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:10.849527336 +0000 UTC m=+1.423454143" watchObservedRunningTime="2025-05-10 00:50:10.860986603 +0000 UTC m=+1.434913412" May 10 00:50:12.758000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:12.758000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dbb400 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:12.758000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:12.759000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:12.759000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dbb440 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:12.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:12.760000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:12.760000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dbb4a0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:12.760000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:12.761000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:12.761000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dbb4e0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:12.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:12.950000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:50:12.950000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0005b4bc0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:50:12.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:13.506093 kubelet[2592]: I0510 00:50:13.506054 2592 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:50:13.507150 env[1711]: time="2025-05-10T00:50:13.507108990Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:50:13.507873 kubelet[2592]: I0510 00:50:13.507840 2592 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:50:14.283410 systemd[1]: Created slice kubepods-besteffort-pod1d2db8aa_d218_4966_a022_9a3fef88a2b1.slice. May 10 00:50:14.286625 kubelet[2592]: I0510 00:50:14.286589 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-48sp5\" (UniqueName: \"kubernetes.io/projected/1d2db8aa-d218-4966-a022-9a3fef88a2b1-kube-api-access-48sp5\") pod \"tigera-operator-789496d6f5-hsf6z\" (UID: \"1d2db8aa-d218-4966-a022-9a3fef88a2b1\") " pod="tigera-operator/tigera-operator-789496d6f5-hsf6z" May 10 00:50:14.286807 kubelet[2592]: I0510 00:50:14.286648 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d2db8aa-d218-4966-a022-9a3fef88a2b1-var-lib-calico\") pod \"tigera-operator-789496d6f5-hsf6z\" (UID: \"1d2db8aa-d218-4966-a022-9a3fef88a2b1\") " pod="tigera-operator/tigera-operator-789496d6f5-hsf6z" May 10 00:50:14.396046 kubelet[2592]: I0510 00:50:14.396003 2592 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:50:14.476011 systemd[1]: Created slice kubepods-besteffort-pod2c7224a5_f428_4da7_8875_f23b6ffa632e.slice. May 10 00:50:14.589890 kubelet[2592]: I0510 00:50:14.589793 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2c7224a5-f428-4da7-8875-f23b6ffa632e-kube-proxy\") pod \"kube-proxy-2xkkw\" (UID: \"2c7224a5-f428-4da7-8875-f23b6ffa632e\") " pod="kube-system/kube-proxy-2xkkw" May 10 00:50:14.590365 kubelet[2592]: I0510 00:50:14.590349 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2c7224a5-f428-4da7-8875-f23b6ffa632e-lib-modules\") pod \"kube-proxy-2xkkw\" (UID: \"2c7224a5-f428-4da7-8875-f23b6ffa632e\") " pod="kube-system/kube-proxy-2xkkw" May 10 00:50:14.590494 kubelet[2592]: I0510 00:50:14.590482 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pwmnc\" (UniqueName: \"kubernetes.io/projected/2c7224a5-f428-4da7-8875-f23b6ffa632e-kube-api-access-pwmnc\") pod \"kube-proxy-2xkkw\" (UID: \"2c7224a5-f428-4da7-8875-f23b6ffa632e\") " pod="kube-system/kube-proxy-2xkkw" May 10 00:50:14.590583 kubelet[2592]: I0510 00:50:14.590573 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2c7224a5-f428-4da7-8875-f23b6ffa632e-xtables-lock\") pod \"kube-proxy-2xkkw\" (UID: \"2c7224a5-f428-4da7-8875-f23b6ffa632e\") " pod="kube-system/kube-proxy-2xkkw" May 10 00:50:14.594307 env[1711]: time="2025-05-10T00:50:14.594246137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-hsf6z,Uid:1d2db8aa-d218-4966-a022-9a3fef88a2b1,Namespace:tigera-operator,Attempt:0,}" May 10 00:50:14.622649 env[1711]: time="2025-05-10T00:50:14.622540545Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:14.622649 env[1711]: time="2025-05-10T00:50:14.622590551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:14.622649 env[1711]: time="2025-05-10T00:50:14.622601161Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:14.622929 env[1711]: time="2025-05-10T00:50:14.622756423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c pid=2659 runtime=io.containerd.runc.v2 May 10 00:50:14.646328 systemd[1]: run-containerd-runc-k8s.io-ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c-runc.uR93FD.mount: Deactivated successfully. May 10 00:50:14.649270 systemd[1]: Started cri-containerd-ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c.scope. May 10 00:50:14.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668758 kernel: kauditd_printk_skb: 18 callbacks suppressed May 10 00:50:14.668910 kernel: audit: type=1400 audit(1746838214.660:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.669797 kernel: audit: type=1400 audit(1746838214.660:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.680880 kernel: audit: type=1400 audit(1746838214.660:783): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.681155 kernel: audit: type=1400 audit(1746838214.660:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.692112 kernel: audit: type=1400 audit(1746838214.660:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.708790 kernel: audit: type=1400 audit(1746838214.660:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.719434 kernel: audit: type=1400 audit(1746838214.660:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.726734 kernel: audit: type=1400 audit(1746838214.660:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.735265 kernel: audit: type=1400 audit(1746838214.660:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.741781 kernel: audit: type=1400 audit(1746838214.660:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.660000 audit: BPF prog-id=106 op=LOAD May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2659 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386135303339623361386431343530366239363833363838613930 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2659 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386135303339623361386431343530366239363833363838613930 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit: BPF prog-id=107 op=LOAD May 10 00:50:14.668000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000277ff0 items=0 ppid=2659 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386135303339623361386431343530366239363833363838613930 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit: BPF prog-id=108 op=LOAD May 10 00:50:14.668000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003f4038 items=0 ppid=2659 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386135303339623361386431343530366239363833363838613930 May 10 00:50:14.668000 audit: BPF prog-id=108 op=UNLOAD May 10 00:50:14.668000 audit: BPF prog-id=107 op=UNLOAD May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.743254 env[1711]: time="2025-05-10T00:50:14.742278141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-789496d6f5-hsf6z,Uid:1d2db8aa-d218-4966-a022-9a3fef88a2b1,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c\"" May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { perfmon } for pid=2669 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit[2669]: AVC avc: denied { bpf } for pid=2669 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.668000 audit: BPF prog-id=109 op=LOAD May 10 00:50:14.668000 audit[2669]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003f4448 items=0 ppid=2659 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563386135303339623361386431343530366239363833363838613930 May 10 00:50:14.747739 env[1711]: time="2025-05-10T00:50:14.747115547Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:50:14.782581 env[1711]: time="2025-05-10T00:50:14.782538973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2xkkw,Uid:2c7224a5-f428-4da7-8875-f23b6ffa632e,Namespace:kube-system,Attempt:0,}" May 10 00:50:14.811317 env[1711]: time="2025-05-10T00:50:14.811235505Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:14.811473 env[1711]: time="2025-05-10T00:50:14.811346397Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:14.811473 env[1711]: time="2025-05-10T00:50:14.811371242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:14.811534 env[1711]: time="2025-05-10T00:50:14.811513095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/633032f61de20dda485ca0440db1f9bf6ec56160d67c7373f97a6a0dd5198b25 pid=2700 runtime=io.containerd.runc.v2 May 10 00:50:14.829369 systemd[1]: Started cri-containerd-633032f61de20dda485ca0440db1f9bf6ec56160d67c7373f97a6a0dd5198b25.scope. May 10 00:50:14.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.845000 audit: BPF prog-id=110 op=LOAD May 10 00:50:14.848000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.848000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333033326636316465323064646134383563613034343064623166 May 10 00:50:14.848000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.848000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333033326636316465323064646134383563613034343064623166 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit: BPF prog-id=111 op=LOAD May 10 00:50:14.849000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000346f60 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333033326636316465323064646134383563613034343064623166 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit: BPF prog-id=112 op=LOAD May 10 00:50:14.849000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000346fa8 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333033326636316465323064646134383563613034343064623166 May 10 00:50:14.849000 audit: BPF prog-id=112 op=UNLOAD May 10 00:50:14.849000 audit: BPF prog-id=111 op=UNLOAD May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { perfmon } for pid=2710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit[2710]: AVC avc: denied { bpf } for pid=2710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.849000 audit: BPF prog-id=113 op=LOAD May 10 00:50:14.849000 audit[2710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003473b8 items=0 ppid=2700 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633333033326636316465323064646134383563613034343064623166 May 10 00:50:14.881580 env[1711]: time="2025-05-10T00:50:14.881513922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2xkkw,Uid:2c7224a5-f428-4da7-8875-f23b6ffa632e,Namespace:kube-system,Attempt:0,} returns sandbox id \"633032f61de20dda485ca0440db1f9bf6ec56160d67c7373f97a6a0dd5198b25\"" May 10 00:50:14.890544 env[1711]: time="2025-05-10T00:50:14.890500884Z" level=info msg="CreateContainer within sandbox \"633032f61de20dda485ca0440db1f9bf6ec56160d67c7373f97a6a0dd5198b25\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:50:14.931038 env[1711]: time="2025-05-10T00:50:14.930984207Z" level=info msg="CreateContainer within sandbox \"633032f61de20dda485ca0440db1f9bf6ec56160d67c7373f97a6a0dd5198b25\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"68ed0c9102e336aef827af77293f251e79d43d7acb2f6fa2c180dfc53e500dbd\"" May 10 00:50:14.932332 env[1711]: time="2025-05-10T00:50:14.932269376Z" level=info msg="StartContainer for \"68ed0c9102e336aef827af77293f251e79d43d7acb2f6fa2c180dfc53e500dbd\"" May 10 00:50:14.958599 systemd[1]: Started cri-containerd-68ed0c9102e336aef827af77293f251e79d43d7acb2f6fa2c180dfc53e500dbd.scope. May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc376326808 items=0 ppid=2700 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638656430633931303265333336616566383237616637373239336632 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit: BPF prog-id=114 op=LOAD May 10 00:50:14.987000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003aa138 items=0 ppid=2700 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638656430633931303265333336616566383237616637373239336632 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit: BPF prog-id=115 op=LOAD May 10 00:50:14.987000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003aa188 items=0 ppid=2700 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638656430633931303265333336616566383237616637373239336632 May 10 00:50:14.987000 audit: BPF prog-id=115 op=UNLOAD May 10 00:50:14.987000 audit: BPF prog-id=114 op=UNLOAD May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:14.987000 audit: BPF prog-id=116 op=LOAD May 10 00:50:14.987000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003aa218 items=0 ppid=2700 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638656430633931303265333336616566383237616637373239336632 May 10 00:50:15.012846 env[1711]: time="2025-05-10T00:50:15.012766572Z" level=info msg="StartContainer for \"68ed0c9102e336aef827af77293f251e79d43d7acb2f6fa2c180dfc53e500dbd\" returns successfully" May 10 00:50:15.191000 audit[1981]: USER_END pid=1981 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:15.191804 sudo[1981]: pam_unix(sudo:session): session closed for user root May 10 00:50:15.194000 audit[1981]: CRED_DISP pid=1981 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:50:15.230039 sshd[1978]: pam_unix(sshd:session): session closed for user core May 10 00:50:15.230000 audit[1978]: USER_END pid=1978 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:15.230000 audit[1978]: CRED_DISP pid=1978 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:15.233117 systemd[1]: sshd@6-172.31.28.58:22-139.178.89.65:50050.service: Deactivated successfully. May 10 00:50:15.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.28.58:22-139.178.89.65:50050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:15.233828 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:50:15.233960 systemd[1]: session-7.scope: Consumed 4.911s CPU time. May 10 00:50:15.234476 systemd-logind[1701]: Session 7 logged out. Waiting for processes to exit. May 10 00:50:15.235390 systemd-logind[1701]: Removed session 7. May 10 00:50:15.735008 kubelet[2592]: I0510 00:50:15.734938 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2xkkw" podStartSLOduration=1.73491997 podStartE2EDuration="1.73491997s" podCreationTimestamp="2025-05-10 00:50:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:15.734403574 +0000 UTC m=+6.308330386" watchObservedRunningTime="2025-05-10 00:50:15.73491997 +0000 UTC m=+6.308846778" May 10 00:50:16.277827 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3762536849.mount: Deactivated successfully. May 10 00:50:16.677000 audit[2823]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.677000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd20767ae0 a2=0 a3=7ffd20767acc items=0 ppid=2761 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:16.679000 audit[2824]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.679000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe744da050 a2=0 a3=7ffe744da03c items=0 ppid=2761 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:50:16.681000 audit[2825]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2825 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.681000 audit[2825]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0e012730 a2=0 a3=7ffc0e01271c items=0 ppid=2761 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:16.684000 audit[2826]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.684000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb1243310 a2=0 a3=7fffb12432fc items=0 ppid=2761 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:50:16.685000 audit[2827]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.685000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb2d5cc40 a2=0 a3=7ffeb2d5cc2c items=0 ppid=2761 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:16.687000 audit[2828]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.687000 audit[2828]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3edea9e0 a2=0 a3=7fff3edea9cc items=0 ppid=2761 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:50:16.802000 audit[2829]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.802000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5b0c0e30 a2=0 a3=7fff5b0c0e1c items=0 ppid=2761 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:16.814000 audit[2831]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2831 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.814000 audit[2831]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd8632dfc0 a2=0 a3=7ffd8632dfac items=0 ppid=2761 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:50:16.826000 audit[2834]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2834 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.826000 audit[2834]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe50613e40 a2=0 a3=7ffe50613e2c items=0 ppid=2761 pid=2834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:50:16.830000 audit[2835]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.830000 audit[2835]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3f42ae10 a2=0 a3=7ffd3f42adfc items=0 ppid=2761 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:16.835000 audit[2837]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.835000 audit[2837]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc97150380 a2=0 a3=7ffc9715036c items=0 ppid=2761 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.835000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:16.839000 audit[2838]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.839000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff22cc4150 a2=0 a3=7fff22cc413c items=0 ppid=2761 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:16.845000 audit[2840]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.845000 audit[2840]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff79b49440 a2=0 a3=7fff79b4942c items=0 ppid=2761 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:16.857000 audit[2843]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.857000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffef31d6a30 a2=0 a3=7ffef31d6a1c items=0 ppid=2761 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:50:16.859000 audit[2844]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.859000 audit[2844]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf2799ff0 a2=0 a3=7ffcf2799fdc items=0 ppid=2761 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:16.863000 audit[2846]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.863000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee0191ef0 a2=0 a3=7ffee0191edc items=0 ppid=2761 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:16.865000 audit[2847]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.865000 audit[2847]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd155a9d10 a2=0 a3=7ffd155a9cfc items=0 ppid=2761 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:16.869000 audit[2849]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2849 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.869000 audit[2849]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa2326850 a2=0 a3=7fffa232683c items=0 ppid=2761 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:16.874000 audit[2852]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.874000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff300d2d90 a2=0 a3=7fff300d2d7c items=0 ppid=2761 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:16.879000 audit[2855]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.879000 audit[2855]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef49cc4f0 a2=0 a3=7ffef49cc4dc items=0 ppid=2761 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:16.882000 audit[2856]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2856 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.882000 audit[2856]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda1c48320 a2=0 a3=7ffda1c4830c items=0 ppid=2761 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:16.887000 audit[2858]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2858 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.887000 audit[2858]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc5c994190 a2=0 a3=7ffc5c99417c items=0 ppid=2761 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:16.892000 audit[2861]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2861 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.892000 audit[2861]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc35f22700 a2=0 a3=7ffc35f226ec items=0 ppid=2761 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:16.894000 audit[2862]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2862 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.894000 audit[2862]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd161f6f80 a2=0 a3=7ffd161f6f6c items=0 ppid=2761 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:16.898000 audit[2864]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:50:16.898000 audit[2864]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc7e796cd0 a2=0 a3=7ffc7e796cbc items=0 ppid=2761 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:16.963000 audit[2870]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:16.963000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc635b7240 a2=0 a3=7ffc635b722c items=0 ppid=2761 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:16.977000 audit[2870]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2870 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:16.977000 audit[2870]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc635b7240 a2=0 a3=7ffc635b722c items=0 ppid=2761 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:16.980000 audit[2875]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.980000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe28643940 a2=0 a3=7ffe2864392c items=0 ppid=2761 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:50:16.987000 audit[2877]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.987000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde37b0cc0 a2=0 a3=7ffde37b0cac items=0 ppid=2761 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:50:16.996000 audit[2880]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.996000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd870ae60 a2=0 a3=7ffcd870ae4c items=0 ppid=2761 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:50:16.998000 audit[2881]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2881 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:16.998000 audit[2881]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff44842cd0 a2=0 a3=7fff44842cbc items=0 ppid=2761 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:50:17.003000 audit[2883]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.003000 audit[2883]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5ecd8400 a2=0 a3=7fff5ecd83ec items=0 ppid=2761 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:50:17.005000 audit[2884]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.005000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff00e47c50 a2=0 a3=7fff00e47c3c items=0 ppid=2761 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:50:17.009000 audit[2886]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.009000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd643568a0 a2=0 a3=7ffd6435688c items=0 ppid=2761 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:50:17.015000 audit[2889]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2889 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.015000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff50dc7a20 a2=0 a3=7fff50dc7a0c items=0 ppid=2761 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:50:17.016000 audit[2890]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2890 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.016000 audit[2890]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb6de0c40 a2=0 a3=7fffb6de0c2c items=0 ppid=2761 pid=2890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.016000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:50:17.020000 audit[2892]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.020000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee169a380 a2=0 a3=7ffee169a36c items=0 ppid=2761 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:50:17.022000 audit[2893]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.022000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaa710040 a2=0 a3=7ffeaa71002c items=0 ppid=2761 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:50:17.025000 audit[2895]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.025000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef2325460 a2=0 a3=7ffef232544c items=0 ppid=2761 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:50:17.031000 audit[2898]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.031000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfda07fc0 a2=0 a3=7ffdfda07fac items=0 ppid=2761 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:50:17.039000 audit[2901]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.039000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc56b95d70 a2=0 a3=7ffc56b95d5c items=0 ppid=2761 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:50:17.041000 audit[2902]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.041000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe399e4370 a2=0 a3=7ffe399e435c items=0 ppid=2761 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:50:17.045000 audit[2904]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.045000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffed30b5d0 a2=0 a3=7fffed30b5bc items=0 ppid=2761 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:17.050000 audit[2907]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.050000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffa7b93ab0 a2=0 a3=7fffa7b93a9c items=0 ppid=2761 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:50:17.052000 audit[2908]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.052000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7cdbc350 a2=0 a3=7ffc7cdbc33c items=0 ppid=2761 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:50:17.056000 audit[2910]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.056000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffff77e3fa0 a2=0 a3=7ffff77e3f8c items=0 ppid=2761 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:50:17.058000 audit[2911]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.058000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff3058fb0 a2=0 a3=7ffff3058f9c items=0 ppid=2761 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:50:17.061000 audit[2913]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.061000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe1152b290 a2=0 a3=7ffe1152b27c items=0 ppid=2761 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:17.066000 audit[2916]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:50:17.066000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4fa3e840 a2=0 a3=7ffd4fa3e82c items=0 ppid=2761 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:50:17.091000 audit[2918]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:17.091000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdf58b7690 a2=0 a3=7ffdf58b767c items=0 ppid=2761 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.091000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:17.092000 audit[2918]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:50:17.092000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdf58b7690 a2=0 a3=7ffdf58b767c items=0 ppid=2761 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.092000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:17.202903 env[1711]: time="2025-05-10T00:50:17.202836283Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:17.207203 env[1711]: time="2025-05-10T00:50:17.207034413Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:17.210222 env[1711]: time="2025-05-10T00:50:17.210184107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:17.212887 env[1711]: time="2025-05-10T00:50:17.212850917Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:17.213396 env[1711]: time="2025-05-10T00:50:17.213363490Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:50:17.224688 env[1711]: time="2025-05-10T00:50:17.221937292Z" level=info msg="CreateContainer within sandbox \"ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:50:17.245894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1844448591.mount: Deactivated successfully. May 10 00:50:17.257048 env[1711]: time="2025-05-10T00:50:17.256976956Z" level=info msg="CreateContainer within sandbox \"ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1\"" May 10 00:50:17.258803 env[1711]: time="2025-05-10T00:50:17.258030290Z" level=info msg="StartContainer for \"9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1\"" May 10 00:50:17.287977 systemd[1]: Started cri-containerd-9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1.scope. May 10 00:50:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit: BPF prog-id=117 op=LOAD May 10 00:50:17.297000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2659 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646435393061353731636138633435313832386366393033323961 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2659 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646435393061353731636138633435313832386366393033323961 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.297000 audit: BPF prog-id=118 op=LOAD May 10 00:50:17.297000 audit[2926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ff7d0 items=0 ppid=2659 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646435393061353731636138633435313832386366393033323961 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit: BPF prog-id=119 op=LOAD May 10 00:50:17.298000 audit[2926]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ff818 items=0 ppid=2659 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646435393061353731636138633435313832386366393033323961 May 10 00:50:17.298000 audit: BPF prog-id=119 op=UNLOAD May 10 00:50:17.298000 audit: BPF prog-id=118 op=UNLOAD May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { perfmon } for pid=2926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit[2926]: AVC avc: denied { bpf } for pid=2926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:17.298000 audit: BPF prog-id=120 op=LOAD May 10 00:50:17.298000 audit[2926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ffc28 items=0 ppid=2659 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:17.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646435393061353731636138633435313832386366393033323961 May 10 00:50:17.314389 env[1711]: time="2025-05-10T00:50:17.314310002Z" level=info msg="StartContainer for \"9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1\" returns successfully" May 10 00:50:17.749255 kubelet[2592]: I0510 00:50:17.748318 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-789496d6f5-hsf6z" podStartSLOduration=1.271953728 podStartE2EDuration="3.748299142s" podCreationTimestamp="2025-05-10 00:50:14 +0000 UTC" firstStartedPulling="2025-05-10 00:50:14.744142531 +0000 UTC m=+5.318069325" lastFinishedPulling="2025-05-10 00:50:17.220487932 +0000 UTC m=+7.794414739" observedRunningTime="2025-05-10 00:50:17.747201227 +0000 UTC m=+8.321128038" watchObservedRunningTime="2025-05-10 00:50:17.748299142 +0000 UTC m=+8.322225936" May 10 00:50:18.241094 systemd[1]: run-containerd-runc-k8s.io-9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1-runc.vtu7qN.mount: Deactivated successfully. May 10 00:50:20.480000 audit[2963]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.483866 kernel: kauditd_printk_skb: 362 callbacks suppressed May 10 00:50:20.483981 kernel: audit: type=1325 audit(1746838220.480:897): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.480000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe10920b00 a2=0 a3=7ffe10920aec items=0 ppid=2761 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.496064 kernel: audit: type=1300 audit(1746838220.480:897): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe10920b00 a2=0 a3=7ffe10920aec items=0 ppid=2761 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.500276 kernel: audit: type=1327 audit(1746838220.480:897): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.500000 audit[2963]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.500000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe10920b00 a2=0 a3=0 items=0 ppid=2761 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.515245 kernel: audit: type=1325 audit(1746838220.500:898): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.515389 kernel: audit: type=1300 audit(1746838220.500:898): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe10920b00 a2=0 a3=0 items=0 ppid=2761 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.515424 kernel: audit: type=1327 audit(1746838220.500:898): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.530000 audit[2965]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.541021 kernel: audit: type=1325 audit(1746838220.530:899): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.530000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffee6f410b0 a2=0 a3=7ffee6f4109c items=0 ppid=2761 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.530000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.557464 kernel: audit: type=1300 audit(1746838220.530:899): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffee6f410b0 a2=0 a3=7ffee6f4109c items=0 ppid=2761 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.557661 kernel: audit: type=1327 audit(1746838220.530:899): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.558000 audit[2965]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.558000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee6f410b0 a2=0 a3=0 items=0 ppid=2761 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:20.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:20.565748 kernel: audit: type=1325 audit(1746838220.558:900): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:20.733439 systemd[1]: Created slice kubepods-besteffort-pod676e568b_2bf3_47eb_a65d_861041d33df3.slice. May 10 00:50:20.830967 kubelet[2592]: I0510 00:50:20.830916 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/676e568b-2bf3-47eb-a65d-861041d33df3-tigera-ca-bundle\") pod \"calico-typha-97589b595-mgqg2\" (UID: \"676e568b-2bf3-47eb-a65d-861041d33df3\") " pod="calico-system/calico-typha-97589b595-mgqg2" May 10 00:50:20.830967 kubelet[2592]: I0510 00:50:20.830972 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/676e568b-2bf3-47eb-a65d-861041d33df3-typha-certs\") pod \"calico-typha-97589b595-mgqg2\" (UID: \"676e568b-2bf3-47eb-a65d-861041d33df3\") " pod="calico-system/calico-typha-97589b595-mgqg2" May 10 00:50:20.831680 kubelet[2592]: I0510 00:50:20.830999 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7z2qc\" (UniqueName: \"kubernetes.io/projected/676e568b-2bf3-47eb-a65d-861041d33df3-kube-api-access-7z2qc\") pod \"calico-typha-97589b595-mgqg2\" (UID: \"676e568b-2bf3-47eb-a65d-861041d33df3\") " pod="calico-system/calico-typha-97589b595-mgqg2" May 10 00:50:20.923107 systemd[1]: Created slice kubepods-besteffort-poddbc649a2_900e_4501_a1b1_6c84dba9809f.slice. May 10 00:50:20.932192 kubelet[2592]: I0510 00:50:20.932155 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-run-calico\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932377 kubelet[2592]: I0510 00:50:20.932234 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dbc649a2-900e-4501-a1b1-6c84dba9809f-tigera-ca-bundle\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932377 kubelet[2592]: I0510 00:50:20.932256 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dbc649a2-900e-4501-a1b1-6c84dba9809f-node-certs\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932377 kubelet[2592]: I0510 00:50:20.932294 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-lib-calico\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932377 kubelet[2592]: I0510 00:50:20.932319 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-lib-modules\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932377 kubelet[2592]: I0510 00:50:20.932341 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-flexvol-driver-host\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932610 kubelet[2592]: I0510 00:50:20.932385 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-xtables-lock\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932610 kubelet[2592]: I0510 00:50:20.932408 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-bin-dir\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932610 kubelet[2592]: I0510 00:50:20.932448 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcmht\" (UniqueName: \"kubernetes.io/projected/dbc649a2-900e-4501-a1b1-6c84dba9809f-kube-api-access-zcmht\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932610 kubelet[2592]: I0510 00:50:20.932474 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-policysync\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932610 kubelet[2592]: I0510 00:50:20.932565 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-net-dir\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:20.932842 kubelet[2592]: I0510 00:50:20.932607 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-log-dir\") pod \"calico-node-6mgtx\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " pod="calico-system/calico-node-6mgtx" May 10 00:50:21.036089 kubelet[2592]: E0510 00:50:21.036056 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.036272 kubelet[2592]: W0510 00:50:21.036107 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.036272 kubelet[2592]: E0510 00:50:21.036136 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.036521 kubelet[2592]: E0510 00:50:21.036498 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.036521 kubelet[2592]: W0510 00:50:21.036513 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.036633 kubelet[2592]: E0510 00:50:21.036591 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.036706 kubelet[2592]: E0510 00:50:21.036695 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.036757 kubelet[2592]: W0510 00:50:21.036705 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.036757 kubelet[2592]: E0510 00:50:21.036738 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.036919 kubelet[2592]: E0510 00:50:21.036906 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.036919 kubelet[2592]: W0510 00:50:21.036917 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.036996 kubelet[2592]: E0510 00:50:21.036927 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.037072 kubelet[2592]: E0510 00:50:21.037062 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.037072 kubelet[2592]: W0510 00:50:21.037072 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.037152 kubelet[2592]: E0510 00:50:21.037081 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.037278 kubelet[2592]: E0510 00:50:21.037267 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.037278 kubelet[2592]: W0510 00:50:21.037278 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.037356 kubelet[2592]: E0510 00:50:21.037289 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.037442 kubelet[2592]: E0510 00:50:21.037433 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.037442 kubelet[2592]: W0510 00:50:21.037442 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.037508 kubelet[2592]: E0510 00:50:21.037449 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.037628 kubelet[2592]: E0510 00:50:21.037617 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.037628 kubelet[2592]: W0510 00:50:21.037626 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.037628 kubelet[2592]: E0510 00:50:21.037685 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.043901 env[1711]: time="2025-05-10T00:50:21.043672638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-97589b595-mgqg2,Uid:676e568b-2bf3-47eb-a65d-861041d33df3,Namespace:calico-system,Attempt:0,}" May 10 00:50:21.045848 kubelet[2592]: E0510 00:50:21.045772 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.045848 kubelet[2592]: W0510 00:50:21.045789 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.045848 kubelet[2592]: E0510 00:50:21.045808 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.057793 kubelet[2592]: E0510 00:50:21.057567 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.057793 kubelet[2592]: W0510 00:50:21.057585 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.057793 kubelet[2592]: E0510 00:50:21.057604 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.078822 env[1711]: time="2025-05-10T00:50:21.078755092Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:21.079005 env[1711]: time="2025-05-10T00:50:21.078983374Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:21.079079 env[1711]: time="2025-05-10T00:50:21.079063292Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:21.079287 env[1711]: time="2025-05-10T00:50:21.079263891Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb pid=2988 runtime=io.containerd.runc.v2 May 10 00:50:21.118297 systemd[1]: Started cri-containerd-9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb.scope. May 10 00:50:21.130592 kubelet[2592]: E0510 00:50:21.130551 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:21.134851 kubelet[2592]: E0510 00:50:21.134821 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.134851 kubelet[2592]: W0510 00:50:21.134848 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.135083 kubelet[2592]: E0510 00:50:21.134872 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.136141 kubelet[2592]: E0510 00:50:21.136119 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.136141 kubelet[2592]: W0510 00:50:21.136139 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.136304 kubelet[2592]: E0510 00:50:21.136157 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.136377 kubelet[2592]: E0510 00:50:21.136362 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.136429 kubelet[2592]: W0510 00:50:21.136379 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.136429 kubelet[2592]: E0510 00:50:21.136393 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.137410 kubelet[2592]: E0510 00:50:21.137391 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.137410 kubelet[2592]: W0510 00:50:21.137408 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.137562 kubelet[2592]: E0510 00:50:21.137422 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.137636 kubelet[2592]: E0510 00:50:21.137622 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.137700 kubelet[2592]: W0510 00:50:21.137638 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.137700 kubelet[2592]: E0510 00:50:21.137660 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.138006 kubelet[2592]: E0510 00:50:21.137863 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.138006 kubelet[2592]: W0510 00:50:21.137873 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.138006 kubelet[2592]: E0510 00:50:21.137885 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.141027 kubelet[2592]: E0510 00:50:21.141007 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.141027 kubelet[2592]: W0510 00:50:21.141026 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.141171 kubelet[2592]: E0510 00:50:21.141043 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.141530 kubelet[2592]: E0510 00:50:21.141512 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.141621 kubelet[2592]: W0510 00:50:21.141530 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.141621 kubelet[2592]: E0510 00:50:21.141545 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.143168 kubelet[2592]: E0510 00:50:21.143151 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.143168 kubelet[2592]: W0510 00:50:21.143168 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.143320 kubelet[2592]: E0510 00:50:21.143183 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.143393 kubelet[2592]: E0510 00:50:21.143375 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.143393 kubelet[2592]: W0510 00:50:21.143390 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.143518 kubelet[2592]: E0510 00:50:21.143403 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.143591 kubelet[2592]: E0510 00:50:21.143578 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.143660 kubelet[2592]: W0510 00:50:21.143592 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.143660 kubelet[2592]: E0510 00:50:21.143604 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.143818 kubelet[2592]: E0510 00:50:21.143805 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.143904 kubelet[2592]: W0510 00:50:21.143819 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.143904 kubelet[2592]: E0510 00:50:21.143831 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.149950 kubelet[2592]: E0510 00:50:21.149918 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.149950 kubelet[2592]: W0510 00:50:21.149948 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.150141 kubelet[2592]: E0510 00:50:21.149970 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.152192 kubelet[2592]: E0510 00:50:21.152164 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.152192 kubelet[2592]: W0510 00:50:21.152188 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.152381 kubelet[2592]: E0510 00:50:21.152206 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.152467 kubelet[2592]: E0510 00:50:21.152452 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.152515 kubelet[2592]: W0510 00:50:21.152469 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.152515 kubelet[2592]: E0510 00:50:21.152484 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.152705 kubelet[2592]: E0510 00:50:21.152689 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.152780 kubelet[2592]: W0510 00:50:21.152706 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.152780 kubelet[2592]: E0510 00:50:21.152733 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.154960 kubelet[2592]: E0510 00:50:21.154821 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.154960 kubelet[2592]: W0510 00:50:21.154839 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.154960 kubelet[2592]: E0510 00:50:21.154858 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.155947 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.156982 kubelet[2592]: W0510 00:50:21.155963 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.155979 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.156242 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.156982 kubelet[2592]: W0510 00:50:21.156254 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.156268 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.156470 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.156982 kubelet[2592]: W0510 00:50:21.156479 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.156491 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.156982 kubelet[2592]: E0510 00:50:21.156833 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.157482 kubelet[2592]: W0510 00:50:21.156844 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.157482 kubelet[2592]: E0510 00:50:21.156857 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.157482 kubelet[2592]: I0510 00:50:21.156884 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c56cf48b-d193-4367-960c-062b280b8403-registration-dir\") pod \"csi-node-driver-22cln\" (UID: \"c56cf48b-d193-4367-960c-062b280b8403\") " pod="calico-system/csi-node-driver-22cln" May 10 00:50:21.162263 kubelet[2592]: E0510 00:50:21.162006 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.162263 kubelet[2592]: W0510 00:50:21.162033 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.162263 kubelet[2592]: E0510 00:50:21.162062 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.162263 kubelet[2592]: I0510 00:50:21.162094 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c56cf48b-d193-4367-960c-062b280b8403-socket-dir\") pod \"csi-node-driver-22cln\" (UID: \"c56cf48b-d193-4367-960c-062b280b8403\") " pod="calico-system/csi-node-driver-22cln" May 10 00:50:21.162567 kubelet[2592]: E0510 00:50:21.162377 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.162567 kubelet[2592]: W0510 00:50:21.162391 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.162567 kubelet[2592]: E0510 00:50:21.162409 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.162567 kubelet[2592]: I0510 00:50:21.162434 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sgtjj\" (UniqueName: \"kubernetes.io/projected/c56cf48b-d193-4367-960c-062b280b8403-kube-api-access-sgtjj\") pod \"csi-node-driver-22cln\" (UID: \"c56cf48b-d193-4367-960c-062b280b8403\") " pod="calico-system/csi-node-driver-22cln" May 10 00:50:21.162788 kubelet[2592]: E0510 00:50:21.162663 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.162788 kubelet[2592]: W0510 00:50:21.162676 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.162788 kubelet[2592]: E0510 00:50:21.162689 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.162788 kubelet[2592]: I0510 00:50:21.162728 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c56cf48b-d193-4367-960c-062b280b8403-varrun\") pod \"csi-node-driver-22cln\" (UID: \"c56cf48b-d193-4367-960c-062b280b8403\") " pod="calico-system/csi-node-driver-22cln" May 10 00:50:21.162981 kubelet[2592]: E0510 00:50:21.162939 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.162981 kubelet[2592]: W0510 00:50:21.162950 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.162981 kubelet[2592]: E0510 00:50:21.162964 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.163127 kubelet[2592]: I0510 00:50:21.162984 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c56cf48b-d193-4367-960c-062b280b8403-kubelet-dir\") pod \"csi-node-driver-22cln\" (UID: \"c56cf48b-d193-4367-960c-062b280b8403\") " pod="calico-system/csi-node-driver-22cln" May 10 00:50:21.163214 kubelet[2592]: E0510 00:50:21.163191 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.163214 kubelet[2592]: W0510 00:50:21.163206 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.163315 kubelet[2592]: E0510 00:50:21.163293 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.163445 kubelet[2592]: E0510 00:50:21.163429 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.163516 kubelet[2592]: W0510 00:50:21.163445 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.163572 kubelet[2592]: E0510 00:50:21.163538 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.163679 kubelet[2592]: E0510 00:50:21.163664 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.163679 kubelet[2592]: W0510 00:50:21.163679 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.163821 kubelet[2592]: E0510 00:50:21.163694 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.163916 kubelet[2592]: E0510 00:50:21.163900 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.163974 kubelet[2592]: W0510 00:50:21.163917 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.163974 kubelet[2592]: E0510 00:50:21.163933 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.164133 kubelet[2592]: E0510 00:50:21.164118 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.164190 kubelet[2592]: W0510 00:50:21.164134 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.164190 kubelet[2592]: E0510 00:50:21.164148 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.164345 kubelet[2592]: E0510 00:50:21.164332 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.164399 kubelet[2592]: W0510 00:50:21.164346 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.164399 kubelet[2592]: E0510 00:50:21.164357 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.164573 kubelet[2592]: E0510 00:50:21.164559 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.164629 kubelet[2592]: W0510 00:50:21.164575 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.164629 kubelet[2592]: E0510 00:50:21.164586 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.164813 kubelet[2592]: E0510 00:50:21.164800 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.164876 kubelet[2592]: W0510 00:50:21.164814 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.164876 kubelet[2592]: E0510 00:50:21.164828 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.165038 kubelet[2592]: E0510 00:50:21.165023 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.165091 kubelet[2592]: W0510 00:50:21.165039 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.165091 kubelet[2592]: E0510 00:50:21.165050 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.165289 kubelet[2592]: E0510 00:50:21.165276 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.165348 kubelet[2592]: W0510 00:50:21.165290 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.165348 kubelet[2592]: E0510 00:50:21.165301 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.171000 audit: BPF prog-id=121 op=LOAD May 10 00:50:21.171000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.171000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2988 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323761616563326262643534663830396461323638306233393662 May 10 00:50:21.171000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.171000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2988 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323761616563326262643534663830396461323638306233393662 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.172000 audit: BPF prog-id=122 op=LOAD May 10 00:50:21.172000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212e00 items=0 ppid=2988 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323761616563326262643534663830396461323638306233393662 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit: BPF prog-id=123 op=LOAD May 10 00:50:21.173000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212e48 items=0 ppid=2988 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323761616563326262643534663830396461323638306233393662 May 10 00:50:21.173000 audit: BPF prog-id=123 op=UNLOAD May 10 00:50:21.173000 audit: BPF prog-id=122 op=UNLOAD May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { perfmon } for pid=2998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit[2998]: AVC avc: denied { bpf } for pid=2998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.173000 audit: BPF prog-id=124 op=LOAD May 10 00:50:21.173000 audit[2998]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000213258 items=0 ppid=2988 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962323761616563326262643534663830396461323638306233393662 May 10 00:50:21.227044 env[1711]: time="2025-05-10T00:50:21.226975117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6mgtx,Uid:dbc649a2-900e-4501-a1b1-6c84dba9809f,Namespace:calico-system,Attempt:0,}" May 10 00:50:21.264256 kubelet[2592]: E0510 00:50:21.264211 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.264256 kubelet[2592]: W0510 00:50:21.264241 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.264571 kubelet[2592]: E0510 00:50:21.264265 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.264571 kubelet[2592]: E0510 00:50:21.264553 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.264571 kubelet[2592]: W0510 00:50:21.264564 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.264773 kubelet[2592]: E0510 00:50:21.264581 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.264853 kubelet[2592]: E0510 00:50:21.264834 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.264853 kubelet[2592]: W0510 00:50:21.264852 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.264995 kubelet[2592]: E0510 00:50:21.264870 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265118 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.265947 kubelet[2592]: W0510 00:50:21.265132 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265149 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265380 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.265947 kubelet[2592]: W0510 00:50:21.265390 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265405 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265626 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.265947 kubelet[2592]: W0510 00:50:21.265634 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265742 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.265947 kubelet[2592]: E0510 00:50:21.265874 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.267461 kubelet[2592]: W0510 00:50:21.265883 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.267461 kubelet[2592]: E0510 00:50:21.265964 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.267461 kubelet[2592]: E0510 00:50:21.266093 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.267461 kubelet[2592]: W0510 00:50:21.266101 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.267461 kubelet[2592]: E0510 00:50:21.266181 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.267461 kubelet[2592]: E0510 00:50:21.266309 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.267461 kubelet[2592]: W0510 00:50:21.266318 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.267461 kubelet[2592]: E0510 00:50:21.266400 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.267461 kubelet[2592]: E0510 00:50:21.266527 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.267461 kubelet[2592]: W0510 00:50:21.266534 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.267895 kubelet[2592]: E0510 00:50:21.266613 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.267895 kubelet[2592]: E0510 00:50:21.266758 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.267895 kubelet[2592]: W0510 00:50:21.266767 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.267895 kubelet[2592]: E0510 00:50:21.266783 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.267895 kubelet[2592]: E0510 00:50:21.267032 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.267895 kubelet[2592]: W0510 00:50:21.267043 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.267895 kubelet[2592]: E0510 00:50:21.267059 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.269841 kubelet[2592]: E0510 00:50:21.267351 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.270011 kubelet[2592]: W0510 00:50:21.269848 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.270011 kubelet[2592]: E0510 00:50:21.269967 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.270175 kubelet[2592]: E0510 00:50:21.270154 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.270175 kubelet[2592]: W0510 00:50:21.270166 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.270448 kubelet[2592]: E0510 00:50:21.270258 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.270448 kubelet[2592]: E0510 00:50:21.270399 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.270448 kubelet[2592]: W0510 00:50:21.270408 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.270632 kubelet[2592]: E0510 00:50:21.270491 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.270632 kubelet[2592]: E0510 00:50:21.270619 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.270632 kubelet[2592]: W0510 00:50:21.270628 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.270833 kubelet[2592]: E0510 00:50:21.270708 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.270886 kubelet[2592]: E0510 00:50:21.270849 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.270886 kubelet[2592]: W0510 00:50:21.270863 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.271001 kubelet[2592]: E0510 00:50:21.270944 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271069 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.272284 kubelet[2592]: W0510 00:50:21.271080 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271094 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271361 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.272284 kubelet[2592]: W0510 00:50:21.271369 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271385 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271567 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.272284 kubelet[2592]: W0510 00:50:21.271575 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271587 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.272284 kubelet[2592]: E0510 00:50:21.271843 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.276117 kubelet[2592]: W0510 00:50:21.271855 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.276117 kubelet[2592]: E0510 00:50:21.271867 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.276117 kubelet[2592]: E0510 00:50:21.272063 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.276117 kubelet[2592]: W0510 00:50:21.272070 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.276117 kubelet[2592]: E0510 00:50:21.272080 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.276117 kubelet[2592]: E0510 00:50:21.272615 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.276117 kubelet[2592]: W0510 00:50:21.272627 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.276117 kubelet[2592]: E0510 00:50:21.272645 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.276117 kubelet[2592]: E0510 00:50:21.272917 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.276117 kubelet[2592]: W0510 00:50:21.272927 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.276559 kubelet[2592]: E0510 00:50:21.272944 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.276559 kubelet[2592]: E0510 00:50:21.273158 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.276559 kubelet[2592]: W0510 00:50:21.273167 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.276559 kubelet[2592]: E0510 00:50:21.273177 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.306766 env[1711]: time="2025-05-10T00:50:21.300076796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-97589b595-mgqg2,Uid:676e568b-2bf3-47eb-a65d-861041d33df3,Namespace:calico-system,Attempt:0,} returns sandbox id \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\"" May 10 00:50:21.310565 kubelet[2592]: E0510 00:50:21.310160 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:21.310565 kubelet[2592]: W0510 00:50:21.310184 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:21.310565 kubelet[2592]: E0510 00:50:21.310207 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:21.317378 env[1711]: time="2025-05-10T00:50:21.317340099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:50:21.326284 env[1711]: time="2025-05-10T00:50:21.326207566Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:21.326632 env[1711]: time="2025-05-10T00:50:21.326586763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:21.326766 env[1711]: time="2025-05-10T00:50:21.326742915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:21.327061 env[1711]: time="2025-05-10T00:50:21.327029170Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19 pid=3084 runtime=io.containerd.runc.v2 May 10 00:50:21.345849 systemd[1]: Started cri-containerd-4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19.scope. May 10 00:50:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.378000 audit: BPF prog-id=125 op=LOAD May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3084 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613038343335313930343636306336666537653539643564663336 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3084 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613038343335313930343636306336666537653539643564663336 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit: BPF prog-id=126 op=LOAD May 10 00:50:21.379000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000296910 items=0 ppid=3084 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613038343335313930343636306336666537653539643564663336 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit: BPF prog-id=127 op=LOAD May 10 00:50:21.379000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000296958 items=0 ppid=3084 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613038343335313930343636306336666537653539643564663336 May 10 00:50:21.379000 audit: BPF prog-id=127 op=UNLOAD May 10 00:50:21.379000 audit: BPF prog-id=126 op=UNLOAD May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { perfmon } for pid=3098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit[3098]: AVC avc: denied { bpf } for pid=3098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:21.379000 audit: BPF prog-id=128 op=LOAD May 10 00:50:21.379000 audit[3098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000296d68 items=0 ppid=3084 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466613038343335313930343636306336666537653539643564663336 May 10 00:50:21.400799 env[1711]: time="2025-05-10T00:50:21.400687732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-6mgtx,Uid:dbc649a2-900e-4501-a1b1-6c84dba9809f,Namespace:calico-system,Attempt:0,} returns sandbox id \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\"" May 10 00:50:21.574000 audit[3122]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:21.574000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffecae1c830 a2=0 a3=7ffecae1c81c items=0 ppid=2761 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:21.579000 audit[3122]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:21.579000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffecae1c830 a2=0 a3=0 items=0 ppid=2761 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:21.740302 update_engine[1702]: I0510 00:50:21.740134 1702 update_attempter.cc:509] Updating boot flags... May 10 00:50:22.097798 amazon-ssm-agent[1750]: 2025-05-10 00:50:22 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated May 10 00:50:22.676183 kubelet[2592]: E0510 00:50:22.676141 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:23.379826 env[1711]: time="2025-05-10T00:50:23.379753814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.381822 env[1711]: time="2025-05-10T00:50:23.381774409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.383480 env[1711]: time="2025-05-10T00:50:23.383449633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.384912 env[1711]: time="2025-05-10T00:50:23.384884041Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:23.385222 env[1711]: time="2025-05-10T00:50:23.385192351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:50:23.391250 env[1711]: time="2025-05-10T00:50:23.391163653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:50:23.414477 env[1711]: time="2025-05-10T00:50:23.414417298Z" level=info msg="CreateContainer within sandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:50:23.432796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount804786250.mount: Deactivated successfully. May 10 00:50:23.441806 env[1711]: time="2025-05-10T00:50:23.441710378Z" level=info msg="CreateContainer within sandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\"" May 10 00:50:23.442950 env[1711]: time="2025-05-10T00:50:23.442339119Z" level=info msg="StartContainer for \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\"" May 10 00:50:23.472599 systemd[1]: Started cri-containerd-43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936.scope. May 10 00:50:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.505000 audit: BPF prog-id=129 op=LOAD May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2988 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626231383833386338313638356432663864333762336139313262 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2988 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626231383833386338313638356432663864333762336139313262 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit: BPF prog-id=130 op=LOAD May 10 00:50:23.506000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003f6eb0 items=0 ppid=2988 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626231383833386338313638356432663864333762336139313262 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit: BPF prog-id=131 op=LOAD May 10 00:50:23.506000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003f6ef8 items=0 ppid=2988 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626231383833386338313638356432663864333762336139313262 May 10 00:50:23.506000 audit: BPF prog-id=131 op=UNLOAD May 10 00:50:23.506000 audit: BPF prog-id=130 op=UNLOAD May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:23.506000 audit: BPF prog-id=132 op=LOAD May 10 00:50:23.506000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003f7308 items=0 ppid=2988 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433626231383833386338313638356432663864333762336139313262 May 10 00:50:23.547263 env[1711]: time="2025-05-10T00:50:23.547205731Z" level=info msg="StartContainer for \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\" returns successfully" May 10 00:50:23.778564 kubelet[2592]: E0510 00:50:23.778532 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.779135 kubelet[2592]: W0510 00:50:23.779109 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.779266 kubelet[2592]: E0510 00:50:23.779249 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.779659 kubelet[2592]: E0510 00:50:23.779644 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.779802 kubelet[2592]: W0510 00:50:23.779788 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.779913 kubelet[2592]: E0510 00:50:23.779900 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.785769 kubelet[2592]: E0510 00:50:23.785226 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.785769 kubelet[2592]: W0510 00:50:23.785255 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.785769 kubelet[2592]: E0510 00:50:23.785294 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.785769 kubelet[2592]: E0510 00:50:23.785609 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.785769 kubelet[2592]: W0510 00:50:23.785621 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.785769 kubelet[2592]: E0510 00:50:23.785635 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.786190 kubelet[2592]: E0510 00:50:23.785912 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.786190 kubelet[2592]: W0510 00:50:23.785923 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.786190 kubelet[2592]: E0510 00:50:23.785936 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.787124 kubelet[2592]: E0510 00:50:23.787101 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.787124 kubelet[2592]: W0510 00:50:23.787122 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.787311 kubelet[2592]: E0510 00:50:23.787137 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.787374 kubelet[2592]: E0510 00:50:23.787344 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.787374 kubelet[2592]: W0510 00:50:23.787354 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.787374 kubelet[2592]: E0510 00:50:23.787366 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.788266 kubelet[2592]: I0510 00:50:23.788218 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-97589b595-mgqg2" podStartSLOduration=1.7167256819999999 podStartE2EDuration="3.788203604s" podCreationTimestamp="2025-05-10 00:50:20 +0000 UTC" firstStartedPulling="2025-05-10 00:50:21.314683853 +0000 UTC m=+11.888610649" lastFinishedPulling="2025-05-10 00:50:23.386161778 +0000 UTC m=+13.960088571" observedRunningTime="2025-05-10 00:50:23.787797508 +0000 UTC m=+14.361724322" watchObservedRunningTime="2025-05-10 00:50:23.788203604 +0000 UTC m=+14.362130444" May 10 00:50:23.791141 kubelet[2592]: E0510 00:50:23.788250 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.791325 kubelet[2592]: W0510 00:50:23.791304 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.791443 kubelet[2592]: E0510 00:50:23.791429 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.796994 kubelet[2592]: E0510 00:50:23.796928 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.796994 kubelet[2592]: W0510 00:50:23.796955 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.796994 kubelet[2592]: E0510 00:50:23.796979 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.799088 kubelet[2592]: E0510 00:50:23.799056 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.799088 kubelet[2592]: W0510 00:50:23.799079 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.799271 kubelet[2592]: E0510 00:50:23.799101 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.800580 kubelet[2592]: E0510 00:50:23.800538 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.800767 kubelet[2592]: W0510 00:50:23.800579 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.800767 kubelet[2592]: E0510 00:50:23.800636 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.801384 kubelet[2592]: E0510 00:50:23.801368 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.801553 kubelet[2592]: W0510 00:50:23.801535 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.801725 kubelet[2592]: E0510 00:50:23.801669 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.802283 kubelet[2592]: E0510 00:50:23.802265 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.802869 kubelet[2592]: W0510 00:50:23.802833 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.803006 kubelet[2592]: E0510 00:50:23.802991 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.803355 kubelet[2592]: E0510 00:50:23.803341 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.803464 kubelet[2592]: W0510 00:50:23.803451 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.803570 kubelet[2592]: E0510 00:50:23.803558 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.803923 kubelet[2592]: E0510 00:50:23.803910 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.804022 kubelet[2592]: W0510 00:50:23.804010 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.804115 kubelet[2592]: E0510 00:50:23.804103 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.804530 kubelet[2592]: E0510 00:50:23.804510 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.804635 kubelet[2592]: W0510 00:50:23.804622 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.804783 kubelet[2592]: E0510 00:50:23.804769 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.805168 kubelet[2592]: E0510 00:50:23.805148 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.805267 kubelet[2592]: W0510 00:50:23.805254 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.805363 kubelet[2592]: E0510 00:50:23.805350 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.805706 kubelet[2592]: E0510 00:50:23.805685 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.805862 kubelet[2592]: W0510 00:50:23.805850 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.806072 kubelet[2592]: E0510 00:50:23.806057 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.806607 kubelet[2592]: E0510 00:50:23.806553 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.806607 kubelet[2592]: W0510 00:50:23.806595 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.806878 kubelet[2592]: E0510 00:50:23.806618 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.807858 kubelet[2592]: E0510 00:50:23.807694 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.807858 kubelet[2592]: W0510 00:50:23.807709 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.807858 kubelet[2592]: E0510 00:50:23.807743 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.809792 kubelet[2592]: E0510 00:50:23.809222 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.809792 kubelet[2592]: W0510 00:50:23.809237 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.809792 kubelet[2592]: E0510 00:50:23.809453 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.809792 kubelet[2592]: W0510 00:50:23.809462 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.810211 kubelet[2592]: E0510 00:50:23.810194 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.810321 kubelet[2592]: E0510 00:50:23.810309 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.810561 kubelet[2592]: E0510 00:50:23.810547 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.810650 kubelet[2592]: W0510 00:50:23.810638 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.810752 kubelet[2592]: E0510 00:50:23.810739 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.811107 kubelet[2592]: E0510 00:50:23.811093 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.811216 kubelet[2592]: W0510 00:50:23.811202 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.811297 kubelet[2592]: E0510 00:50:23.811286 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.812053 kubelet[2592]: E0510 00:50:23.812040 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.812151 kubelet[2592]: W0510 00:50:23.812139 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.812232 kubelet[2592]: E0510 00:50:23.812220 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.812752 kubelet[2592]: E0510 00:50:23.812706 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.812862 kubelet[2592]: W0510 00:50:23.812849 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.812948 kubelet[2592]: E0510 00:50:23.812937 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.813256 kubelet[2592]: E0510 00:50:23.813243 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.813355 kubelet[2592]: W0510 00:50:23.813343 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.813438 kubelet[2592]: E0510 00:50:23.813427 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.813778 kubelet[2592]: E0510 00:50:23.813765 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.813891 kubelet[2592]: W0510 00:50:23.813877 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.814502 kubelet[2592]: E0510 00:50:23.814485 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.815115 kubelet[2592]: E0510 00:50:23.815102 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.815211 kubelet[2592]: W0510 00:50:23.815199 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.815288 kubelet[2592]: E0510 00:50:23.815277 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.815614 kubelet[2592]: E0510 00:50:23.815600 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.815703 kubelet[2592]: W0510 00:50:23.815690 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.815818 kubelet[2592]: E0510 00:50:23.815805 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.816126 kubelet[2592]: E0510 00:50:23.816114 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.816262 kubelet[2592]: W0510 00:50:23.816249 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.816340 kubelet[2592]: E0510 00:50:23.816327 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.816640 kubelet[2592]: E0510 00:50:23.816622 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.816640 kubelet[2592]: W0510 00:50:23.816636 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.816816 kubelet[2592]: E0510 00:50:23.816655 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.816976 kubelet[2592]: E0510 00:50:23.816958 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:23.816976 kubelet[2592]: W0510 00:50:23.816973 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:23.817074 kubelet[2592]: E0510 00:50:23.816987 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:23.837000 audit[3298]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:23.837000 audit[3298]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc715bfe50 a2=0 a3=7ffc715bfe3c items=0 ppid=2761 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:23.842000 audit[3298]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:23.842000 audit[3298]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc715bfe50 a2=0 a3=7ffc715bfe3c items=0 ppid=2761 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:23.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:24.676803 kubelet[2592]: E0510 00:50:24.676761 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:24.692121 env[1711]: time="2025-05-10T00:50:24.692083870Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:24.694850 env[1711]: time="2025-05-10T00:50:24.694808842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:24.696837 env[1711]: time="2025-05-10T00:50:24.696796285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:24.701148 env[1711]: time="2025-05-10T00:50:24.701106861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:24.701565 env[1711]: time="2025-05-10T00:50:24.701538986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:50:24.705280 env[1711]: time="2025-05-10T00:50:24.705231506Z" level=info msg="CreateContainer within sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:50:24.739798 env[1711]: time="2025-05-10T00:50:24.739753237Z" level=info msg="CreateContainer within sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\"" May 10 00:50:24.740656 env[1711]: time="2025-05-10T00:50:24.740611072Z" level=info msg="StartContainer for \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\"" May 10 00:50:24.780633 systemd[1]: Started cri-containerd-15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5.scope. May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fdaac113688 items=0 ppid=3084 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656566383765386439646234366436306666613030653361313662 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit: BPF prog-id=133 op=LOAD May 10 00:50:24.802000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000219138 items=0 ppid=3084 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656566383765386439646234366436306666613030653361313662 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit: BPF prog-id=134 op=LOAD May 10 00:50:24.802000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000219188 items=0 ppid=3084 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656566383765386439646234366436306666613030653361313662 May 10 00:50:24.802000 audit: BPF prog-id=134 op=UNLOAD May 10 00:50:24.802000 audit: BPF prog-id=133 op=UNLOAD May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:24.802000 audit: BPF prog-id=135 op=LOAD May 10 00:50:24.802000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000219218 items=0 ppid=3084 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:24.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135656566383765386439646234366436306666613030653361313662 May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811245 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.813526 kubelet[2592]: W0510 00:50:24.811263 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811287 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811506 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.813526 kubelet[2592]: W0510 00:50:24.811518 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811530 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811749 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.813526 kubelet[2592]: W0510 00:50:24.811761 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811773 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.813526 kubelet[2592]: E0510 00:50:24.811995 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.814551 kubelet[2592]: W0510 00:50:24.812004 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.814551 kubelet[2592]: E0510 00:50:24.812016 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.814551 kubelet[2592]: E0510 00:50:24.812268 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.814551 kubelet[2592]: W0510 00:50:24.812279 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.814551 kubelet[2592]: E0510 00:50:24.812292 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.814551 kubelet[2592]: E0510 00:50:24.812480 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.814551 kubelet[2592]: W0510 00:50:24.812490 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.814551 kubelet[2592]: E0510 00:50:24.812501 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.814551 kubelet[2592]: E0510 00:50:24.812678 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.814551 kubelet[2592]: W0510 00:50:24.812688 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.812698 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.812973 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.815095 kubelet[2592]: W0510 00:50:24.812987 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.813000 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.813225 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.815095 kubelet[2592]: W0510 00:50:24.813236 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.813247 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.813427 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.815095 kubelet[2592]: W0510 00:50:24.813436 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815095 kubelet[2592]: E0510 00:50:24.813446 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.813625 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.815543 kubelet[2592]: W0510 00:50:24.813635 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.813647 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.813882 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.815543 kubelet[2592]: W0510 00:50:24.813893 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.813904 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.814196 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.815543 kubelet[2592]: W0510 00:50:24.814208 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.814221 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.815543 kubelet[2592]: E0510 00:50:24.814416 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818154 kubelet[2592]: W0510 00:50:24.814430 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818154 kubelet[2592]: E0510 00:50:24.814442 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.818154 kubelet[2592]: E0510 00:50:24.814618 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818154 kubelet[2592]: W0510 00:50:24.814628 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818154 kubelet[2592]: E0510 00:50:24.814639 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.818154 kubelet[2592]: E0510 00:50:24.814920 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818154 kubelet[2592]: W0510 00:50:24.814930 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818154 kubelet[2592]: E0510 00:50:24.814942 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.818154 kubelet[2592]: E0510 00:50:24.815222 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818154 kubelet[2592]: W0510 00:50:24.815232 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.815247 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.815536 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818669 kubelet[2592]: W0510 00:50:24.815579 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.815596 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.815951 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818669 kubelet[2592]: W0510 00:50:24.815966 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.816011 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.816340 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.818669 kubelet[2592]: W0510 00:50:24.816351 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.818669 kubelet[2592]: E0510 00:50:24.816368 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.816799 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822354 kubelet[2592]: W0510 00:50:24.816831 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.816910 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.817153 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822354 kubelet[2592]: W0510 00:50:24.817164 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.817229 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.817475 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822354 kubelet[2592]: W0510 00:50:24.817486 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.817548 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822354 kubelet[2592]: E0510 00:50:24.817860 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822606 kubelet[2592]: W0510 00:50:24.817870 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822606 kubelet[2592]: E0510 00:50:24.817889 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822606 kubelet[2592]: E0510 00:50:24.818320 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822606 kubelet[2592]: W0510 00:50:24.818333 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822606 kubelet[2592]: E0510 00:50:24.818350 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822606 kubelet[2592]: E0510 00:50:24.818562 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822606 kubelet[2592]: W0510 00:50:24.818571 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822606 kubelet[2592]: E0510 00:50:24.818585 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822606 kubelet[2592]: E0510 00:50:24.818807 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822606 kubelet[2592]: W0510 00:50:24.818941 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819023 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819264 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822889 kubelet[2592]: W0510 00:50:24.819276 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819292 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819601 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822889 kubelet[2592]: W0510 00:50:24.819612 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819628 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819928 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.822889 kubelet[2592]: W0510 00:50:24.819939 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.822889 kubelet[2592]: E0510 00:50:24.819955 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.823134 kubelet[2592]: E0510 00:50:24.820665 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.823134 kubelet[2592]: W0510 00:50:24.820677 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.823134 kubelet[2592]: E0510 00:50:24.820739 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.823134 kubelet[2592]: E0510 00:50:24.821929 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.823134 kubelet[2592]: W0510 00:50:24.821941 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.823134 kubelet[2592]: E0510 00:50:24.821968 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.823134 kubelet[2592]: E0510 00:50:24.822193 2592 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:50:24.823134 kubelet[2592]: W0510 00:50:24.822204 2592 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:50:24.823134 kubelet[2592]: E0510 00:50:24.822221 2592 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:50:24.843397 env[1711]: time="2025-05-10T00:50:24.843308178Z" level=info msg="StartContainer for \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\" returns successfully" May 10 00:50:24.861790 systemd[1]: cri-containerd-15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5.scope: Deactivated successfully. May 10 00:50:24.868000 audit: BPF prog-id=135 op=UNLOAD May 10 00:50:25.044234 env[1711]: time="2025-05-10T00:50:25.044181211Z" level=info msg="shim disconnected" id=15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5 May 10 00:50:25.044234 env[1711]: time="2025-05-10T00:50:25.044220082Z" level=warning msg="cleaning up after shim disconnected" id=15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5 namespace=k8s.io May 10 00:50:25.044234 env[1711]: time="2025-05-10T00:50:25.044229101Z" level=info msg="cleaning up dead shim" May 10 00:50:25.053227 env[1711]: time="2025-05-10T00:50:25.053157563Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3380 runtime=io.containerd.runc.v2\n" May 10 00:50:25.398478 systemd[1]: run-containerd-runc-k8s.io-15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5-runc.8uTME3.mount: Deactivated successfully. May 10 00:50:25.398581 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5-rootfs.mount: Deactivated successfully. May 10 00:50:25.765260 env[1711]: time="2025-05-10T00:50:25.764999601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:50:26.676647 kubelet[2592]: E0510 00:50:26.676606 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:28.676177 kubelet[2592]: E0510 00:50:28.676122 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:30.203786 env[1711]: time="2025-05-10T00:50:30.203723860Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.205822 env[1711]: time="2025-05-10T00:50:30.205775125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.208473 env[1711]: time="2025-05-10T00:50:30.208437925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.210225 env[1711]: time="2025-05-10T00:50:30.210184574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:30.210590 env[1711]: time="2025-05-10T00:50:30.210558273Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:50:30.214932 env[1711]: time="2025-05-10T00:50:30.214631331Z" level=info msg="CreateContainer within sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:50:30.229945 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3813062344.mount: Deactivated successfully. May 10 00:50:30.239098 env[1711]: time="2025-05-10T00:50:30.239030045Z" level=info msg="CreateContainer within sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\"" May 10 00:50:30.239921 env[1711]: time="2025-05-10T00:50:30.239893373Z" level=info msg="StartContainer for \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\"" May 10 00:50:30.270876 systemd[1]: Started cri-containerd-8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e.scope. May 10 00:50:30.291000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.294985 kernel: kauditd_printk_skb: 229 callbacks suppressed May 10 00:50:30.295727 kernel: audit: type=1400 audit(1746838230.291:966): avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.308688 kernel: audit: type=1300 audit(1746838230.291:966): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0c01a56018 items=0 ppid=3084 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:30.291000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0c01a56018 items=0 ppid=3084 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:30.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313139343465636362653932323762333561336133636435653263 May 10 00:50:30.316904 kernel: audit: type=1327 audit(1746838230.291:966): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313139343465636362653932323762333561336133636435653263 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.328541 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.328652 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.329794 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.354978 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.355103 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.362756 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.368763 kernel: audit: type=1400 audit(1746838230.296:967): avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.296000 audit: BPF prog-id=136 op=LOAD May 10 00:50:30.296000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fa888 items=0 ppid=3084 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:30.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313139343465636362653932323762333561336133636435653263 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.298000 audit: BPF prog-id=137 op=LOAD May 10 00:50:30.298000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fa8d8 items=0 ppid=3084 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:30.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313139343465636362653932323762333561336133636435653263 May 10 00:50:30.307000 audit: BPF prog-id=137 op=UNLOAD May 10 00:50:30.307000 audit: BPF prog-id=136 op=UNLOAD May 10 00:50:30.307000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { perfmon } for pid=3406 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit[3406]: AVC avc: denied { bpf } for pid=3406 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:30.307000 audit: BPF prog-id=138 op=LOAD May 10 00:50:30.307000 audit[3406]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fa968 items=0 ppid=3084 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:30.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313139343465636362653932323762333561336133636435653263 May 10 00:50:30.373054 env[1711]: time="2025-05-10T00:50:30.372976946Z" level=info msg="StartContainer for \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\" returns successfully" May 10 00:50:30.676830 kubelet[2592]: E0510 00:50:30.676775 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:31.069166 env[1711]: time="2025-05-10T00:50:31.069099164Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:50:31.071782 systemd[1]: cri-containerd-8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e.scope: Deactivated successfully. May 10 00:50:31.074000 audit: BPF prog-id=138 op=UNLOAD May 10 00:50:31.098101 env[1711]: time="2025-05-10T00:50:31.097647867Z" level=info msg="shim disconnected" id=8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e May 10 00:50:31.098101 env[1711]: time="2025-05-10T00:50:31.097687757Z" level=warning msg="cleaning up after shim disconnected" id=8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e namespace=k8s.io May 10 00:50:31.098101 env[1711]: time="2025-05-10T00:50:31.097768031Z" level=info msg="cleaning up dead shim" May 10 00:50:31.105812 env[1711]: time="2025-05-10T00:50:31.105763883Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3446 runtime=io.containerd.runc.v2\n" May 10 00:50:31.161375 kubelet[2592]: I0510 00:50:31.161174 2592 kubelet_node_status.go:502] "Fast updating node status as it just became ready" May 10 00:50:31.205215 systemd[1]: Created slice kubepods-burstable-poda65a8624_5006_4401_a7ce_37fb7636b1b0.slice. May 10 00:50:31.222200 systemd[1]: Created slice kubepods-besteffort-pod22e6394c_4593_4b80_96ed_9080e295c004.slice. May 10 00:50:31.229830 systemd[1]: run-containerd-runc-k8s.io-8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e-runc.C1NKPu.mount: Deactivated successfully. May 10 00:50:31.229958 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e-rootfs.mount: Deactivated successfully. May 10 00:50:31.240132 systemd[1]: Created slice kubepods-besteffort-pod7cb46bd7_f6f0_4f40_bba9_9a82d00084f3.slice. May 10 00:50:31.248186 systemd[1]: Created slice kubepods-besteffort-podcda7d11e_b129_49dd_a536_d25c8eed1b8c.slice. May 10 00:50:31.257399 systemd[1]: Created slice kubepods-burstable-pod6e1cccca_0933_4b7c_b858_dd02621e6c78.slice. May 10 00:50:31.266752 systemd[1]: Created slice kubepods-besteffort-pod3e389aba_45af_41cb_8bb1_203d68ea6cb3.slice. May 10 00:50:31.275522 kubelet[2592]: I0510 00:50:31.275489 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e389aba-45af-41cb-8bb1-203d68ea6cb3-tigera-ca-bundle\") pod \"calico-kube-controllers-7d4dc549b6-r5rcc\" (UID: \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\") " pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" May 10 00:50:31.275706 kubelet[2592]: I0510 00:50:31.275568 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dmqx9\" (UniqueName: \"kubernetes.io/projected/3e389aba-45af-41cb-8bb1-203d68ea6cb3-kube-api-access-dmqx9\") pod \"calico-kube-controllers-7d4dc549b6-r5rcc\" (UID: \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\") " pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" May 10 00:50:31.275706 kubelet[2592]: I0510 00:50:31.275594 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a65a8624-5006-4401-a7ce-37fb7636b1b0-config-volume\") pod \"coredns-668d6bf9bc-62t5d\" (UID: \"a65a8624-5006-4401-a7ce-37fb7636b1b0\") " pod="kube-system/coredns-668d6bf9bc-62t5d" May 10 00:50:31.275706 kubelet[2592]: I0510 00:50:31.275638 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8658m\" (UniqueName: \"kubernetes.io/projected/a65a8624-5006-4401-a7ce-37fb7636b1b0-kube-api-access-8658m\") pod \"coredns-668d6bf9bc-62t5d\" (UID: \"a65a8624-5006-4401-a7ce-37fb7636b1b0\") " pod="kube-system/coredns-668d6bf9bc-62t5d" May 10 00:50:31.275706 kubelet[2592]: I0510 00:50:31.275662 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cda7d11e-b129-49dd-a536-d25c8eed1b8c-calico-apiserver-certs\") pod \"calico-apiserver-7546f75ff6-xjxxm\" (UID: \"cda7d11e-b129-49dd-a536-d25c8eed1b8c\") " pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" May 10 00:50:31.275957 kubelet[2592]: I0510 00:50:31.275709 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7lbs6\" (UniqueName: \"kubernetes.io/projected/cda7d11e-b129-49dd-a536-d25c8eed1b8c-kube-api-access-7lbs6\") pod \"calico-apiserver-7546f75ff6-xjxxm\" (UID: \"cda7d11e-b129-49dd-a536-d25c8eed1b8c\") " pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" May 10 00:50:31.275957 kubelet[2592]: I0510 00:50:31.275783 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kdwrt\" (UniqueName: \"kubernetes.io/projected/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-kube-api-access-kdwrt\") pod \"calico-apiserver-7d74784d74-r928m\" (UID: \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\") " pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" May 10 00:50:31.275957 kubelet[2592]: I0510 00:50:31.275844 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x2w9v\" (UniqueName: \"kubernetes.io/projected/22e6394c-4593-4b80-96ed-9080e295c004-kube-api-access-x2w9v\") pod \"calico-apiserver-7d74784d74-7vsv5\" (UID: \"22e6394c-4593-4b80-96ed-9080e295c004\") " pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" May 10 00:50:31.275957 kubelet[2592]: I0510 00:50:31.275897 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/22e6394c-4593-4b80-96ed-9080e295c004-calico-apiserver-certs\") pod \"calico-apiserver-7d74784d74-7vsv5\" (UID: \"22e6394c-4593-4b80-96ed-9080e295c004\") " pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" May 10 00:50:31.275957 kubelet[2592]: I0510 00:50:31.275923 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rff5l\" (UniqueName: \"kubernetes.io/projected/6e1cccca-0933-4b7c-b858-dd02621e6c78-kube-api-access-rff5l\") pod \"coredns-668d6bf9bc-pbhpv\" (UID: \"6e1cccca-0933-4b7c-b858-dd02621e6c78\") " pod="kube-system/coredns-668d6bf9bc-pbhpv" May 10 00:50:31.276188 kubelet[2592]: I0510 00:50:31.275984 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-calico-apiserver-certs\") pod \"calico-apiserver-7d74784d74-r928m\" (UID: \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\") " pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" May 10 00:50:31.276188 kubelet[2592]: I0510 00:50:31.276045 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6e1cccca-0933-4b7c-b858-dd02621e6c78-config-volume\") pod \"coredns-668d6bf9bc-pbhpv\" (UID: \"6e1cccca-0933-4b7c-b858-dd02621e6c78\") " pod="kube-system/coredns-668d6bf9bc-pbhpv" May 10 00:50:31.509941 env[1711]: time="2025-05-10T00:50:31.509069909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-62t5d,Uid:a65a8624-5006-4401-a7ce-37fb7636b1b0,Namespace:kube-system,Attempt:0,}" May 10 00:50:31.529385 env[1711]: time="2025-05-10T00:50:31.529339088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-7vsv5,Uid:22e6394c-4593-4b80-96ed-9080e295c004,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:31.558253 env[1711]: time="2025-05-10T00:50:31.558215270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546f75ff6-xjxxm,Uid:cda7d11e-b129-49dd-a536-d25c8eed1b8c,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:31.558868 env[1711]: time="2025-05-10T00:50:31.558843042Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-r928m,Uid:7cb46bd7-f6f0-4f40-bba9-9a82d00084f3,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:31.565034 env[1711]: time="2025-05-10T00:50:31.564999096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pbhpv,Uid:6e1cccca-0933-4b7c-b858-dd02621e6c78,Namespace:kube-system,Attempt:0,}" May 10 00:50:31.571124 env[1711]: time="2025-05-10T00:50:31.571053548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4dc549b6-r5rcc,Uid:3e389aba-45af-41cb-8bb1-203d68ea6cb3,Namespace:calico-system,Attempt:0,}" May 10 00:50:31.780310 env[1711]: time="2025-05-10T00:50:31.779416582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:50:31.850824 env[1711]: time="2025-05-10T00:50:31.850763360Z" level=error msg="Failed to destroy network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.851330 env[1711]: time="2025-05-10T00:50:31.851299365Z" level=error msg="encountered an error cleaning up failed sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.851478 env[1711]: time="2025-05-10T00:50:31.851453472Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546f75ff6-xjxxm,Uid:cda7d11e-b129-49dd-a536-d25c8eed1b8c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.852797 kubelet[2592]: E0510 00:50:31.851820 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.852797 kubelet[2592]: E0510 00:50:31.851893 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" May 10 00:50:31.852797 kubelet[2592]: E0510 00:50:31.851915 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" May 10 00:50:31.853172 kubelet[2592]: E0510 00:50:31.851968 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7546f75ff6-xjxxm_calico-apiserver(cda7d11e-b129-49dd-a536-d25c8eed1b8c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7546f75ff6-xjxxm_calico-apiserver(cda7d11e-b129-49dd-a536-d25c8eed1b8c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" podUID="cda7d11e-b129-49dd-a536-d25c8eed1b8c" May 10 00:50:31.861805 env[1711]: time="2025-05-10T00:50:31.861755286Z" level=error msg="Failed to destroy network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.862108 env[1711]: time="2025-05-10T00:50:31.862080921Z" level=error msg="encountered an error cleaning up failed sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.862154 env[1711]: time="2025-05-10T00:50:31.862134525Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-62t5d,Uid:a65a8624-5006-4401-a7ce-37fb7636b1b0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.863143 kubelet[2592]: E0510 00:50:31.862334 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.863143 kubelet[2592]: E0510 00:50:31.862397 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-62t5d" May 10 00:50:31.863143 kubelet[2592]: E0510 00:50:31.862416 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-62t5d" May 10 00:50:31.863384 kubelet[2592]: E0510 00:50:31.862463 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-62t5d_kube-system(a65a8624-5006-4401-a7ce-37fb7636b1b0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-62t5d_kube-system(a65a8624-5006-4401-a7ce-37fb7636b1b0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-62t5d" podUID="a65a8624-5006-4401-a7ce-37fb7636b1b0" May 10 00:50:31.867796 env[1711]: time="2025-05-10T00:50:31.867706317Z" level=error msg="Failed to destroy network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.868212 env[1711]: time="2025-05-10T00:50:31.868162488Z" level=error msg="encountered an error cleaning up failed sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.868309 env[1711]: time="2025-05-10T00:50:31.868240627Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-r928m,Uid:7cb46bd7-f6f0-4f40-bba9-9a82d00084f3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.868533 kubelet[2592]: E0510 00:50:31.868489 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.868617 kubelet[2592]: E0510 00:50:31.868566 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" May 10 00:50:31.868670 kubelet[2592]: E0510 00:50:31.868611 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" May 10 00:50:31.868736 kubelet[2592]: E0510 00:50:31.868666 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7d74784d74-r928m_calico-apiserver(7cb46bd7-f6f0-4f40-bba9-9a82d00084f3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7d74784d74-r928m_calico-apiserver(7cb46bd7-f6f0-4f40-bba9-9a82d00084f3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" podUID="7cb46bd7-f6f0-4f40-bba9-9a82d00084f3" May 10 00:50:31.870919 env[1711]: time="2025-05-10T00:50:31.870871812Z" level=error msg="Failed to destroy network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.871479 env[1711]: time="2025-05-10T00:50:31.871412564Z" level=error msg="encountered an error cleaning up failed sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.871563 env[1711]: time="2025-05-10T00:50:31.871533029Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pbhpv,Uid:6e1cccca-0933-4b7c-b858-dd02621e6c78,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.871883 kubelet[2592]: E0510 00:50:31.871830 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.871981 kubelet[2592]: E0510 00:50:31.871909 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-pbhpv" May 10 00:50:31.871981 kubelet[2592]: E0510 00:50:31.871960 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-pbhpv" May 10 00:50:31.872084 kubelet[2592]: E0510 00:50:31.872035 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-pbhpv_kube-system(6e1cccca-0933-4b7c-b858-dd02621e6c78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-pbhpv_kube-system(6e1cccca-0933-4b7c-b858-dd02621e6c78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-pbhpv" podUID="6e1cccca-0933-4b7c-b858-dd02621e6c78" May 10 00:50:31.892232 env[1711]: time="2025-05-10T00:50:31.892165831Z" level=error msg="Failed to destroy network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.892623 env[1711]: time="2025-05-10T00:50:31.892577606Z" level=error msg="encountered an error cleaning up failed sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.892702 env[1711]: time="2025-05-10T00:50:31.892652628Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4dc549b6-r5rcc,Uid:3e389aba-45af-41cb-8bb1-203d68ea6cb3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.892932 kubelet[2592]: E0510 00:50:31.892895 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.893010 kubelet[2592]: E0510 00:50:31.892961 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" May 10 00:50:31.893010 kubelet[2592]: E0510 00:50:31.892991 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" May 10 00:50:31.893106 kubelet[2592]: E0510 00:50:31.893047 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7d4dc549b6-r5rcc_calico-system(3e389aba-45af-41cb-8bb1-203d68ea6cb3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7d4dc549b6-r5rcc_calico-system(3e389aba-45af-41cb-8bb1-203d68ea6cb3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" podUID="3e389aba-45af-41cb-8bb1-203d68ea6cb3" May 10 00:50:31.894955 env[1711]: time="2025-05-10T00:50:31.894903112Z" level=error msg="Failed to destroy network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.895387 env[1711]: time="2025-05-10T00:50:31.895346528Z" level=error msg="encountered an error cleaning up failed sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.895476 env[1711]: time="2025-05-10T00:50:31.895408879Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-7vsv5,Uid:22e6394c-4593-4b80-96ed-9080e295c004,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.895740 kubelet[2592]: E0510 00:50:31.895695 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:31.895829 kubelet[2592]: E0510 00:50:31.895765 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" May 10 00:50:31.895829 kubelet[2592]: E0510 00:50:31.895794 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" May 10 00:50:31.895948 kubelet[2592]: E0510 00:50:31.895853 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7d74784d74-7vsv5_calico-apiserver(22e6394c-4593-4b80-96ed-9080e295c004)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7d74784d74-7vsv5_calico-apiserver(22e6394c-4593-4b80-96ed-9080e295c004)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" podUID="22e6394c-4593-4b80-96ed-9080e295c004" May 10 00:50:32.681758 systemd[1]: Created slice kubepods-besteffort-podc56cf48b_d193_4367_960c_062b280b8403.slice. May 10 00:50:32.685264 env[1711]: time="2025-05-10T00:50:32.685223594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-22cln,Uid:c56cf48b-d193-4367-960c-062b280b8403,Namespace:calico-system,Attempt:0,}" May 10 00:50:32.763833 env[1711]: time="2025-05-10T00:50:32.763768839Z" level=error msg="Failed to destroy network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.765985 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8-shm.mount: Deactivated successfully. May 10 00:50:32.767088 env[1711]: time="2025-05-10T00:50:32.767037991Z" level=error msg="encountered an error cleaning up failed sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.767261 env[1711]: time="2025-05-10T00:50:32.767236524Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-22cln,Uid:c56cf48b-d193-4367-960c-062b280b8403,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.767540 kubelet[2592]: E0510 00:50:32.767494 2592 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.767652 kubelet[2592]: E0510 00:50:32.767547 2592 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-22cln" May 10 00:50:32.767652 kubelet[2592]: E0510 00:50:32.767567 2592 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-22cln" May 10 00:50:32.767652 kubelet[2592]: E0510 00:50:32.767610 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-22cln_calico-system(c56cf48b-d193-4367-960c-062b280b8403)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-22cln_calico-system(c56cf48b-d193-4367-960c-062b280b8403)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:32.780065 kubelet[2592]: I0510 00:50:32.780015 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:32.783647 kubelet[2592]: I0510 00:50:32.783356 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:50:32.795703 kubelet[2592]: I0510 00:50:32.795674 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:50:32.798035 kubelet[2592]: I0510 00:50:32.798004 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:50:32.800910 env[1711]: time="2025-05-10T00:50:32.799900384Z" level=info msg="StopPodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\"" May 10 00:50:32.800910 env[1711]: time="2025-05-10T00:50:32.800687541Z" level=info msg="StopPodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\"" May 10 00:50:32.801141 kubelet[2592]: I0510 00:50:32.800323 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:50:32.801408 env[1711]: time="2025-05-10T00:50:32.801374956Z" level=info msg="StopPodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\"" May 10 00:50:32.801705 env[1711]: time="2025-05-10T00:50:32.801654992Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" May 10 00:50:32.802018 env[1711]: time="2025-05-10T00:50:32.801999144Z" level=info msg="StopPodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\"" May 10 00:50:32.802223 kubelet[2592]: I0510 00:50:32.802208 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:50:32.803376 env[1711]: time="2025-05-10T00:50:32.803350976Z" level=info msg="StopPodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\"" May 10 00:50:32.807309 kubelet[2592]: I0510 00:50:32.807290 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:50:32.807907 env[1711]: time="2025-05-10T00:50:32.807871746Z" level=info msg="StopPodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\"" May 10 00:50:32.868354 env[1711]: time="2025-05-10T00:50:32.868304100Z" level=error msg="StopPodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" failed" error="failed to destroy network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.868789 kubelet[2592]: E0510 00:50:32.868756 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:50:32.869093 kubelet[2592]: E0510 00:50:32.868818 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd"} May 10 00:50:32.869093 kubelet[2592]: E0510 00:50:32.868874 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a65a8624-5006-4401-a7ce-37fb7636b1b0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.869093 kubelet[2592]: E0510 00:50:32.868895 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a65a8624-5006-4401-a7ce-37fb7636b1b0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-62t5d" podUID="a65a8624-5006-4401-a7ce-37fb7636b1b0" May 10 00:50:32.899705 env[1711]: time="2025-05-10T00:50:32.899656348Z" level=error msg="StopPodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" failed" error="failed to destroy network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.900103 kubelet[2592]: E0510 00:50:32.900060 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:50:32.900228 kubelet[2592]: E0510 00:50:32.900109 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed"} May 10 00:50:32.900228 kubelet[2592]: E0510 00:50:32.900141 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.900228 kubelet[2592]: E0510 00:50:32.900161 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" podUID="3e389aba-45af-41cb-8bb1-203d68ea6cb3" May 10 00:50:32.913889 env[1711]: time="2025-05-10T00:50:32.913834622Z" level=error msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" failed" error="failed to destroy network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.914343 kubelet[2592]: E0510 00:50:32.914311 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:32.914468 kubelet[2592]: E0510 00:50:32.914357 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23"} May 10 00:50:32.914468 kubelet[2592]: E0510 00:50:32.914397 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"22e6394c-4593-4b80-96ed-9080e295c004\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.914468 kubelet[2592]: E0510 00:50:32.914424 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"22e6394c-4593-4b80-96ed-9080e295c004\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" podUID="22e6394c-4593-4b80-96ed-9080e295c004" May 10 00:50:32.922776 env[1711]: time="2025-05-10T00:50:32.922696180Z" level=error msg="StopPodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" failed" error="failed to destroy network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.923170 kubelet[2592]: E0510 00:50:32.923127 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:50:32.923266 kubelet[2592]: E0510 00:50:32.923185 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb"} May 10 00:50:32.923266 kubelet[2592]: E0510 00:50:32.923225 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6e1cccca-0933-4b7c-b858-dd02621e6c78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.923266 kubelet[2592]: E0510 00:50:32.923252 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6e1cccca-0933-4b7c-b858-dd02621e6c78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-pbhpv" podUID="6e1cccca-0933-4b7c-b858-dd02621e6c78" May 10 00:50:32.943360 env[1711]: time="2025-05-10T00:50:32.942002190Z" level=error msg="StopPodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" failed" error="failed to destroy network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.943951 kubelet[2592]: E0510 00:50:32.943772 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:50:32.943951 kubelet[2592]: E0510 00:50:32.943833 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0"} May 10 00:50:32.943951 kubelet[2592]: E0510 00:50:32.943900 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cda7d11e-b129-49dd-a536-d25c8eed1b8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.943951 kubelet[2592]: E0510 00:50:32.943924 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cda7d11e-b129-49dd-a536-d25c8eed1b8c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" podUID="cda7d11e-b129-49dd-a536-d25c8eed1b8c" May 10 00:50:32.952511 env[1711]: time="2025-05-10T00:50:32.952457934Z" level=error msg="StopPodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" failed" error="failed to destroy network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.953425 kubelet[2592]: E0510 00:50:32.952774 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:50:32.953425 kubelet[2592]: E0510 00:50:32.952819 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22"} May 10 00:50:32.953425 kubelet[2592]: E0510 00:50:32.952853 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.953425 kubelet[2592]: E0510 00:50:32.952877 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" podUID="7cb46bd7-f6f0-4f40-bba9-9a82d00084f3" May 10 00:50:32.959570 env[1711]: time="2025-05-10T00:50:32.959522496Z" level=error msg="StopPodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" failed" error="failed to destroy network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:50:32.959990 kubelet[2592]: E0510 00:50:32.959951 2592 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:50:32.960097 kubelet[2592]: E0510 00:50:32.959999 2592 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8"} May 10 00:50:32.960097 kubelet[2592]: E0510 00:50:32.960031 2592 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c56cf48b-d193-4367-960c-062b280b8403\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:50:32.960097 kubelet[2592]: E0510 00:50:32.960052 2592 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c56cf48b-d193-4367-960c-062b280b8403\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-22cln" podUID="c56cf48b-d193-4367-960c-062b280b8403" May 10 00:50:38.709277 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1389945583.mount: Deactivated successfully. May 10 00:50:38.752426 env[1711]: time="2025-05-10T00:50:38.752205536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.762199 env[1711]: time="2025-05-10T00:50:38.762138969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.767143 env[1711]: time="2025-05-10T00:50:38.767098156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.771751 env[1711]: time="2025-05-10T00:50:38.771679846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:38.772574 env[1711]: time="2025-05-10T00:50:38.772519718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:50:38.953746 env[1711]: time="2025-05-10T00:50:38.953543936Z" level=info msg="CreateContainer within sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:50:38.985921 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1623864882.mount: Deactivated successfully. May 10 00:50:39.001976 env[1711]: time="2025-05-10T00:50:39.001869149Z" level=info msg="CreateContainer within sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\"" May 10 00:50:39.011185 env[1711]: time="2025-05-10T00:50:39.010167895Z" level=info msg="StartContainer for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\"" May 10 00:50:39.043289 systemd[1]: Started cri-containerd-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2.scope. May 10 00:50:39.077889 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:50:39.086756 kernel: audit: type=1400 audit(1746838239.069:973): avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.095736 kernel: audit: type=1300 audit(1746838239.069:973): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f3cad726a18 items=0 ppid=3084 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.095815 kernel: audit: type=1327 audit(1746838239.069:973): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363664356164386562393234643339353265313065336165646262 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f3cad726a18 items=0 ppid=3084 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363664356164386562393234643339353265313065336165646262 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.112320 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.112449 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.117838 env[1711]: time="2025-05-10T00:50:39.117778198Z" level=info msg="StartContainer for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" returns successfully" May 10 00:50:39.119934 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.126999 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.133572 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.146528 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.146668 kernel: audit: type=1400 audit(1746838239.069:974): avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.069000 audit: BPF prog-id=139 op=LOAD May 10 00:50:39.069000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0000d9ba8 items=0 ppid=3084 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363664356164386562393234643339353265313065336165646262 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit: BPF prog-id=140 op=LOAD May 10 00:50:39.077000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0000d9bf8 items=0 ppid=3084 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363664356164386562393234643339353265313065336165646262 May 10 00:50:39.077000 audit: BPF prog-id=140 op=UNLOAD May 10 00:50:39.077000 audit: BPF prog-id=139 op=UNLOAD May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { perfmon } for pid=3834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit[3834]: AVC avc: denied { bpf } for pid=3834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:39.077000 audit: BPF prog-id=141 op=LOAD May 10 00:50:39.077000 audit[3834]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0000d9c88 items=0 ppid=3084 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:39.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235363664356164386562393234643339353265313065336165646262 May 10 00:50:39.517395 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:50:39.517560 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:50:39.977305 systemd[1]: run-containerd-runc-k8s.io-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2-runc.3FbtQ8.mount: Deactivated successfully. May 10 00:50:40.962413 systemd[1]: run-containerd-runc-k8s.io-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2-runc.SVbUsZ.mount: Deactivated successfully. May 10 00:50:41.065000 audit[3988]: AVC avc: denied { write } for pid=3988 comm="tee" name="fd" dev="proc" ino=25135 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.065000 audit[3988]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5eaaba28 a2=241 a3=1b6 items=1 ppid=3956 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.065000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:50:41.065000 audit: PATH item=0 name="/dev/fd/63" inode=24443 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.065000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.072000 audit[3992]: AVC avc: denied { write } for pid=3992 comm="tee" name="fd" dev="proc" ino=25141 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.072000 audit[3992]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7f009a26 a2=241 a3=1b6 items=1 ppid=3946 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.072000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:50:41.072000 audit: PATH item=0 name="/dev/fd/63" inode=24446 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.072000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.074000 audit[3971]: AVC avc: denied { write } for pid=3971 comm="tee" name="fd" dev="proc" ino=24451 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.074000 audit[3971]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc06cda27 a2=241 a3=1b6 items=1 ppid=3942 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.074000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:50:41.074000 audit: PATH item=0 name="/dev/fd/63" inode=25116 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.087000 audit[3986]: AVC avc: denied { write } for pid=3986 comm="tee" name="fd" dev="proc" ino=24457 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.087000 audit[3986]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3399fa26 a2=241 a3=1b6 items=1 ppid=3951 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.087000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:50:41.087000 audit: PATH item=0 name="/dev/fd/63" inode=25132 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.087000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.104000 audit[3997]: AVC avc: denied { write } for pid=3997 comm="tee" name="fd" dev="proc" ino=24465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.104000 audit[3997]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0f2eba16 a2=241 a3=1b6 items=1 ppid=3961 pid=3997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.104000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:50:41.104000 audit: PATH item=0 name="/dev/fd/63" inode=24453 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.104000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.118000 audit[4015]: AVC avc: denied { write } for pid=4015 comm="tee" name="fd" dev="proc" ino=24470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.118000 audit[4015]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe98e1ca26 a2=241 a3=1b6 items=1 ppid=3960 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.118000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:50:41.118000 audit: PATH item=0 name="/dev/fd/63" inode=24464 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.118000 audit[3981]: AVC avc: denied { write } for pid=3981 comm="tee" name="fd" dev="proc" ino=24474 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:50:41.118000 audit[3981]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6f17ea17 a2=241 a3=1b6 items=1 ppid=3949 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.118000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:50:41.118000 audit: PATH item=0 name="/dev/fd/63" inode=25127 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:50:41.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.371000 audit: BPF prog-id=142 op=LOAD May 10 00:50:41.371000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd56616e40 a2=98 a3=3 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.371000 audit: BPF prog-id=142 op=UNLOAD May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit: BPF prog-id=143 op=LOAD May 10 00:50:41.373000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd56616c20 a2=74 a3=540051 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.373000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.373000 audit: BPF prog-id=143 op=UNLOAD May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.373000 audit: BPF prog-id=144 op=LOAD May 10 00:50:41.373000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd56616c50 a2=94 a3=2 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.373000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.373000 audit: BPF prog-id=144 op=UNLOAD May 10 00:50:41.519000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.519000 audit: BPF prog-id=145 op=LOAD May 10 00:50:41.519000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd56616b10 a2=40 a3=1 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.519000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.520000 audit: BPF prog-id=145 op=UNLOAD May 10 00:50:41.520000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.520000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd56616be0 a2=50 a3=7ffd56616cc0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.520000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd56616b20 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd56616b50 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd56616a60 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd56616b70 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd56616b50 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd56616b40 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd56616b70 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd56616b50 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd56616b70 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd56616b40 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.531000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.531000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd56616bb0 a2=28 a3=0 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd56616960 a2=50 a3=1 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.532000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit: BPF prog-id=146 op=LOAD May 10 00:50:41.532000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd56616960 a2=94 a3=5 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.532000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.532000 audit: BPF prog-id=146 op=UNLOAD May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd56616a10 a2=50 a3=1 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.532000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd56616b30 a2=4 a3=38 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.532000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { confidentiality } for pid=4034 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.532000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd56616b80 a2=94 a3=6 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.532000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.532000 audit[4034]: AVC avc: denied { confidentiality } for pid=4034 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.532000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd56616330 a2=94 a3=83 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.532000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.533000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.533000 audit[4034]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd56616330 a2=94 a3=83 items=0 ppid=3947 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.533000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit: BPF prog-id=147 op=LOAD May 10 00:50:41.545000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff48e93500 a2=98 a3=1999999999999999 items=0 ppid=3947 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.545000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:41.545000 audit: BPF prog-id=147 op=UNLOAD May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit: BPF prog-id=148 op=LOAD May 10 00:50:41.545000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff48e933e0 a2=74 a3=ffff items=0 ppid=3947 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.545000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:41.545000 audit: BPF prog-id=148 op=UNLOAD May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { perfmon } for pid=4057 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit[4057]: AVC avc: denied { bpf } for pid=4057 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.545000 audit: BPF prog-id=149 op=LOAD May 10 00:50:41.545000 audit[4057]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff48e93420 a2=40 a3=7fff48e93600 items=0 ppid=3947 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.545000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:50:41.545000 audit: BPF prog-id=149 op=UNLOAD May 10 00:50:41.623518 (udev-worker)[3866]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:41.632486 systemd-networkd[1442]: vxlan.calico: Link UP May 10 00:50:41.632493 systemd-networkd[1442]: vxlan.calico: Gained carrier May 10 00:50:41.654775 (udev-worker)[4085]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:41.656126 (udev-worker)[4084]: Network interface NamePolicy= disabled on kernel command line. May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit: BPF prog-id=150 op=LOAD May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe70885c00 a2=98 a3=ffffffff items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit: BPF prog-id=150 op=UNLOAD May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit: BPF prog-id=151 op=LOAD May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe70885a10 a2=74 a3=540051 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit: BPF prog-id=151 op=UNLOAD May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit: BPF prog-id=152 op=LOAD May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe70885a40 a2=94 a3=2 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit: BPF prog-id=152 op=UNLOAD May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe70885910 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70885940 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70885850 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe70885960 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe70885940 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe70885930 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe70885960 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70885940 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.656000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.656000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70885960 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.656000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe70885930 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe708859a0 a2=28 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit: BPF prog-id=153 op=LOAD May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe70885810 a2=40 a3=0 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit: BPF prog-id=153 op=UNLOAD May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe70885800 a2=50 a3=2800 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe70885800 a2=50 a3=2800 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit: BPF prog-id=154 op=LOAD May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe70885020 a2=94 a3=2 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.657000 audit: BPF prog-id=154 op=UNLOAD May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.657000 audit: BPF prog-id=155 op=LOAD May 10 00:50:41.657000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe70885120 a2=94 a3=30 items=0 ppid=3947 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.657000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit: BPF prog-id=156 op=LOAD May 10 00:50:41.670000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2cd54a60 a2=98 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.670000 audit: BPF prog-id=156 op=UNLOAD May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit: BPF prog-id=157 op=LOAD May 10 00:50:41.670000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2cd54840 a2=74 a3=540051 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.670000 audit: BPF prog-id=157 op=UNLOAD May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.670000 audit: BPF prog-id=158 op=LOAD May 10 00:50:41.670000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2cd54870 a2=94 a3=2 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.670000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.671000 audit: BPF prog-id=158 op=UNLOAD May 10 00:50:41.794000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit: BPF prog-id=159 op=LOAD May 10 00:50:41.794000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2cd54730 a2=40 a3=1 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.794000 audit: BPF prog-id=159 op=UNLOAD May 10 00:50:41.794000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.794000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc2cd54800 a2=50 a3=7ffc2cd548e0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.794000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd54740 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2cd54770 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2cd54680 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd54790 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd54770 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd54760 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd54790 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2cd54770 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2cd54790 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2cd54760 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd547d0 a2=28 a3=0 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2cd54580 a2=50 a3=1 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit: BPF prog-id=160 op=LOAD May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2cd54580 a2=94 a3=5 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit: BPF prog-id=160 op=UNLOAD May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2cd54630 a2=50 a3=1 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc2cd54750 a2=4 a3=38 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.805000 audit[4090]: AVC avc: denied { confidentiality } for pid=4090 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.805000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2cd547a0 a2=94 a3=6 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.805000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { confidentiality } for pid=4090 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:50:41.806000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2cd53f50 a2=94 a3=83 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.806000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2cd53f50 a2=94 a3=83 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.806000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.807000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.807000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2cd55990 a2=10 a3=f1f00800 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.807000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.807000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2cd55830 a2=10 a3=3 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.807000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.807000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2cd557d0 a2=10 a3=3 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.807000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:41.807000 audit[4090]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2cd557d0 a2=10 a3=7 items=0 ppid=3947 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.807000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:50:41.815000 audit: BPF prog-id=155 op=UNLOAD May 10 00:50:41.875000 audit[4113]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:41.875000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc933004e0 a2=0 a3=7ffc933004cc items=0 ppid=3947 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.875000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:41.897000 audit[4112]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4112 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:41.897000 audit[4112]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdf512a150 a2=0 a3=7ffdf512a13c items=0 ppid=3947 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:41.903000 audit[4111]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:41.903000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc655fa740 a2=0 a3=7ffc655fa72c items=0 ppid=3947 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.903000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:41.904000 audit[4119]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4119 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:41.904000 audit[4119]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc736d0710 a2=0 a3=7ffc736d06fc items=0 ppid=3947 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:41.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:41.962937 systemd[1]: run-containerd-runc-k8s.io-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2-runc.MhZ7tH.mount: Deactivated successfully. May 10 00:50:42.936934 systemd-networkd[1442]: vxlan.calico: Gained IPv6LL May 10 00:50:43.677657 env[1711]: time="2025-05-10T00:50:43.677618644Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" May 10 00:50:43.779346 kubelet[2592]: I0510 00:50:43.776198 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-6mgtx" podStartSLOduration=6.3841494 podStartE2EDuration="23.771966934s" podCreationTimestamp="2025-05-10 00:50:20 +0000 UTC" firstStartedPulling="2025-05-10 00:50:21.402394459 +0000 UTC m=+11.976321253" lastFinishedPulling="2025-05-10 00:50:38.790211984 +0000 UTC m=+29.364138787" observedRunningTime="2025-05-10 00:50:39.984223275 +0000 UTC m=+30.558150087" watchObservedRunningTime="2025-05-10 00:50:43.771966934 +0000 UTC m=+34.345893800" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:43.771 [INFO][4164] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:43.772 [INFO][4164] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" iface="eth0" netns="/var/run/netns/cni-07393881-823e-8274-8281-e7ff26a01f97" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:43.773 [INFO][4164] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" iface="eth0" netns="/var/run/netns/cni-07393881-823e-8274-8281-e7ff26a01f97" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:43.776 [INFO][4164] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" iface="eth0" netns="/var/run/netns/cni-07393881-823e-8274-8281-e7ff26a01f97" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:43.776 [INFO][4164] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:43.776 [INFO][4164] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.083 [INFO][4171] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.087 [INFO][4171] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.088 [INFO][4171] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.105 [WARNING][4171] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.105 [INFO][4171] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.107 [INFO][4171] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:44.112433 env[1711]: 2025-05-10 00:50:44.109 [INFO][4164] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:44.116935 env[1711]: time="2025-05-10T00:50:44.115623579Z" level=info msg="TearDown network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" successfully" May 10 00:50:44.116935 env[1711]: time="2025-05-10T00:50:44.115668229Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" returns successfully" May 10 00:50:44.116041 systemd[1]: run-netns-cni\x2d07393881\x2d823e\x2d8274\x2d8281\x2de7ff26a01f97.mount: Deactivated successfully. May 10 00:50:44.118253 env[1711]: time="2025-05-10T00:50:44.118210076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-7vsv5,Uid:22e6394c-4593-4b80-96ed-9080e295c004,Namespace:calico-apiserver,Attempt:1,}" May 10 00:50:44.301674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:44.301956 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibfa02c1c7fb: link becomes ready May 10 00:50:44.303177 systemd-networkd[1442]: calibfa02c1c7fb: Link UP May 10 00:50:44.303371 systemd-networkd[1442]: calibfa02c1c7fb: Gained carrier May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.187 [INFO][4177] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0 calico-apiserver-7d74784d74- calico-apiserver 22e6394c-4593-4b80-96ed-9080e295c004 752 0 2025-05-10 00:50:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d74784d74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-58 calico-apiserver-7d74784d74-7vsv5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibfa02c1c7fb [] []}} ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.187 [INFO][4177] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.239 [INFO][4189] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.249 [INFO][4189] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-58", "pod":"calico-apiserver-7d74784d74-7vsv5", "timestamp":"2025-05-10 00:50:44.239216865 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.249 [INFO][4189] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.249 [INFO][4189] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.250 [INFO][4189] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.252 [INFO][4189] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.263 [INFO][4189] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.269 [INFO][4189] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.272 [INFO][4189] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.275 [INFO][4189] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.275 [INFO][4189] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.277 [INFO][4189] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5 May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.282 [INFO][4189] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.292 [INFO][4189] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.193/26] block=192.168.101.192/26 handle="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.292 [INFO][4189] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.193/26] handle="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" host="ip-172-31-28-58" May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.292 [INFO][4189] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:44.323935 env[1711]: 2025-05-10 00:50:44.292 [INFO][4189] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.193/26] IPv6=[] ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.325444 env[1711]: 2025-05-10 00:50:44.296 [INFO][4177] cni-plugin/k8s.go 386: Populated endpoint ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"22e6394c-4593-4b80-96ed-9080e295c004", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"calico-apiserver-7d74784d74-7vsv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibfa02c1c7fb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:44.325444 env[1711]: 2025-05-10 00:50:44.296 [INFO][4177] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.193/32] ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.325444 env[1711]: 2025-05-10 00:50:44.296 [INFO][4177] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibfa02c1c7fb ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.325444 env[1711]: 2025-05-10 00:50:44.303 [INFO][4177] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.325444 env[1711]: 2025-05-10 00:50:44.304 [INFO][4177] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"22e6394c-4593-4b80-96ed-9080e295c004", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5", Pod:"calico-apiserver-7d74784d74-7vsv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibfa02c1c7fb", MAC:"12:19:a2:24:8d:e6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:44.325444 env[1711]: 2025-05-10 00:50:44.319 [INFO][4177] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-7vsv5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:44.355763 kernel: kauditd_printk_skb: 562 callbacks suppressed May 10 00:50:44.355896 kernel: audit: type=1325 audit(1746838244.345:1081): table=filter:101 family=2 entries=40 op=nft_register_chain pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:44.355934 kernel: audit: type=1300 audit(1746838244.345:1081): arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7fff872e0f40 a2=0 a3=7fff872e0f2c items=0 ppid=3947 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.345000 audit[4213]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4213 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:44.345000 audit[4213]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7fff872e0f40 a2=0 a3=7fff872e0f2c items=0 ppid=3947 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.356232 env[1711]: time="2025-05-10T00:50:44.347979978Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:44.356232 env[1711]: time="2025-05-10T00:50:44.348076621Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:44.356232 env[1711]: time="2025-05-10T00:50:44.348113384Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:44.356232 env[1711]: time="2025-05-10T00:50:44.348302058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5 pid=4217 runtime=io.containerd.runc.v2 May 10 00:50:44.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:44.366926 kernel: audit: type=1327 audit(1746838244.345:1081): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:44.388945 systemd[1]: run-containerd-runc-k8s.io-55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5-runc.p24X8f.mount: Deactivated successfully. May 10 00:50:44.396917 systemd[1]: Started cri-containerd-55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5.scope. May 10 00:50:44.424107 kernel: audit: type=1400 audit(1746838244.416:1082): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.424237 kernel: audit: type=1400 audit(1746838244.416:1083): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427914 kernel: audit: type=1400 audit(1746838244.416:1084): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.431616 kernel: audit: type=1400 audit(1746838244.416:1085): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.441293 kernel: audit: type=1400 audit(1746838244.416:1086): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.441433 kernel: audit: type=1400 audit(1746838244.416:1087): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.420000 audit: BPF prog-id=161 op=LOAD May 10 00:50:44.423000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.448793 kernel: audit: type=1400 audit(1746838244.416:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4217 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663533363063633135353630373037313566303863653030663034 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4217 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663533363063633135353630373037313566303863653030663034 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.423000 audit: BPF prog-id=162 op=LOAD May 10 00:50:44.423000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001fe730 items=0 ppid=4217 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663533363063633135353630373037313566303863653030663034 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit: BPF prog-id=163 op=LOAD May 10 00:50:44.427000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001fe778 items=0 ppid=4217 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663533363063633135353630373037313566303863653030663034 May 10 00:50:44.427000 audit: BPF prog-id=163 op=UNLOAD May 10 00:50:44.427000 audit: BPF prog-id=162 op=UNLOAD May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { perfmon } for pid=4226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit[4226]: AVC avc: denied { bpf } for pid=4226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:44.427000 audit: BPF prog-id=164 op=LOAD May 10 00:50:44.427000 audit[4226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001feb88 items=0 ppid=4217 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:44.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663533363063633135353630373037313566303863653030663034 May 10 00:50:44.478664 env[1711]: time="2025-05-10T00:50:44.478603220Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-7vsv5,Uid:22e6394c-4593-4b80-96ed-9080e295c004,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\"" May 10 00:50:44.492031 env[1711]: time="2025-05-10T00:50:44.491988148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:50:44.676874 env[1711]: time="2025-05-10T00:50:44.676778569Z" level=info msg="StopPodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\"" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.732 [INFO][4264] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.732 [INFO][4264] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" iface="eth0" netns="/var/run/netns/cni-699728f7-0127-c63b-733b-23990a4c6ca1" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.732 [INFO][4264] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" iface="eth0" netns="/var/run/netns/cni-699728f7-0127-c63b-733b-23990a4c6ca1" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.732 [INFO][4264] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" iface="eth0" netns="/var/run/netns/cni-699728f7-0127-c63b-733b-23990a4c6ca1" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.732 [INFO][4264] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.732 [INFO][4264] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.763 [INFO][4271] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.763 [INFO][4271] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.763 [INFO][4271] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.770 [WARNING][4271] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.770 [INFO][4271] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.772 [INFO][4271] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:44.776569 env[1711]: 2025-05-10 00:50:44.774 [INFO][4264] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:50:44.777998 env[1711]: time="2025-05-10T00:50:44.776747622Z" level=info msg="TearDown network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" successfully" May 10 00:50:44.777998 env[1711]: time="2025-05-10T00:50:44.776772097Z" level=info msg="StopPodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" returns successfully" May 10 00:50:44.777998 env[1711]: time="2025-05-10T00:50:44.777697181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pbhpv,Uid:6e1cccca-0933-4b7c-b858-dd02621e6c78,Namespace:kube-system,Attempt:1,}" May 10 00:50:45.044832 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie5cf9a59240: link becomes ready May 10 00:50:45.045323 systemd-networkd[1442]: calie5cf9a59240: Link UP May 10 00:50:45.045537 systemd-networkd[1442]: calie5cf9a59240: Gained carrier May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.845 [INFO][4278] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0 coredns-668d6bf9bc- kube-system 6e1cccca-0933-4b7c-b858-dd02621e6c78 758 0 2025-05-10 00:50:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-58 coredns-668d6bf9bc-pbhpv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie5cf9a59240 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.845 [INFO][4278] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.889 [INFO][4290] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" HandleID="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.903 [INFO][4290] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" HandleID="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031aa40), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-58", "pod":"coredns-668d6bf9bc-pbhpv", "timestamp":"2025-05-10 00:50:44.889536031 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.903 [INFO][4290] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.903 [INFO][4290] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.903 [INFO][4290] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:44.906 [INFO][4290] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.004 [INFO][4290] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.012 [INFO][4290] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.015 [INFO][4290] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.017 [INFO][4290] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.017 [INFO][4290] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.020 [INFO][4290] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1 May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.025 [INFO][4290] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.035 [INFO][4290] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.194/26] block=192.168.101.192/26 handle="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.035 [INFO][4290] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.194/26] handle="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" host="ip-172-31-28-58" May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.035 [INFO][4290] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:45.070695 env[1711]: 2025-05-10 00:50:45.035 [INFO][4290] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.194/26] IPv6=[] ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" HandleID="k8s-pod-network.752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.071920 env[1711]: 2025-05-10 00:50:45.037 [INFO][4278] cni-plugin/k8s.go 386: Populated endpoint ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6e1cccca-0933-4b7c-b858-dd02621e6c78", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"coredns-668d6bf9bc-pbhpv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5cf9a59240", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:45.071920 env[1711]: 2025-05-10 00:50:45.038 [INFO][4278] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.194/32] ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.071920 env[1711]: 2025-05-10 00:50:45.038 [INFO][4278] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie5cf9a59240 ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.071920 env[1711]: 2025-05-10 00:50:45.047 [INFO][4278] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.071920 env[1711]: 2025-05-10 00:50:45.047 [INFO][4278] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6e1cccca-0933-4b7c-b858-dd02621e6c78", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1", Pod:"coredns-668d6bf9bc-pbhpv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5cf9a59240", MAC:"92:75:b4:bb:1c:48", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:45.071920 env[1711]: 2025-05-10 00:50:45.068 [INFO][4278] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1" Namespace="kube-system" Pod="coredns-668d6bf9bc-pbhpv" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:50:45.090000 audit[4315]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4315 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:45.090000 audit[4315]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffec398abe0 a2=0 a3=7ffec398abcc items=0 ppid=3947 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.090000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:45.095952 env[1711]: time="2025-05-10T00:50:45.095863531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:45.096159 env[1711]: time="2025-05-10T00:50:45.095915859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:45.096159 env[1711]: time="2025-05-10T00:50:45.095931720Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:45.096317 env[1711]: time="2025-05-10T00:50:45.096180552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1 pid=4319 runtime=io.containerd.runc.v2 May 10 00:50:45.112259 systemd[1]: Started cri-containerd-752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1.scope. May 10 00:50:45.121890 systemd[1]: run-netns-cni\x2d699728f7\x2d0127\x2dc63b\x2d733b\x2d23990a4c6ca1.mount: Deactivated successfully. May 10 00:50:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.137000 audit: BPF prog-id=165 op=LOAD May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4319 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326463313231633165343463333938613366313133323334626562 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4319 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326463313231633165343463333938613366313133323334626562 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit: BPF prog-id=166 op=LOAD May 10 00:50:45.138000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=4319 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326463313231633165343463333938613366313133323334626562 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit: BPF prog-id=167 op=LOAD May 10 00:50:45.138000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=4319 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326463313231633165343463333938613366313133323334626562 May 10 00:50:45.138000 audit: BPF prog-id=167 op=UNLOAD May 10 00:50:45.138000 audit: BPF prog-id=166 op=UNLOAD May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.138000 audit: BPF prog-id=168 op=LOAD May 10 00:50:45.138000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=4319 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735326463313231633165343463333938613366313133323334626562 May 10 00:50:45.181032 env[1711]: time="2025-05-10T00:50:45.180982081Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-pbhpv,Uid:6e1cccca-0933-4b7c-b858-dd02621e6c78,Namespace:kube-system,Attempt:1,} returns sandbox id \"752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1\"" May 10 00:50:45.186022 env[1711]: time="2025-05-10T00:50:45.185932946Z" level=info msg="CreateContainer within sandbox \"752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:50:45.224816 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount502267473.mount: Deactivated successfully. May 10 00:50:45.235980 env[1711]: time="2025-05-10T00:50:45.235927751Z" level=info msg="CreateContainer within sandbox \"752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8a7d66fc07fcad4a77a0d366ea4659e4d8704357272d6af102d6f64316b7f2a5\"" May 10 00:50:45.237812 env[1711]: time="2025-05-10T00:50:45.237779197Z" level=info msg="StartContainer for \"8a7d66fc07fcad4a77a0d366ea4659e4d8704357272d6af102d6f64316b7f2a5\"" May 10 00:50:45.265060 systemd[1]: Started cri-containerd-8a7d66fc07fcad4a77a0d366ea4659e4d8704357272d6af102d6f64316b7f2a5.scope. May 10 00:50:45.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit: BPF prog-id=169 op=LOAD May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4319 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376436366663303766636164346137376130643336366561343635 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4319 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376436366663303766636164346137376130643336366561343635 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit: BPF prog-id=170 op=LOAD May 10 00:50:45.289000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a5b70 items=0 ppid=4319 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376436366663303766636164346137376130643336366561343635 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit: BPF prog-id=171 op=LOAD May 10 00:50:45.289000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a5bb8 items=0 ppid=4319 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376436366663303766636164346137376130643336366561343635 May 10 00:50:45.289000 audit: BPF prog-id=171 op=UNLOAD May 10 00:50:45.289000 audit: BPF prog-id=170 op=UNLOAD May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:45.289000 audit: BPF prog-id=172 op=LOAD May 10 00:50:45.289000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a5fc8 items=0 ppid=4319 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:45.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376436366663303766636164346137376130643336366561343635 May 10 00:50:45.313366 env[1711]: time="2025-05-10T00:50:45.308340976Z" level=info msg="StartContainer for \"8a7d66fc07fcad4a77a0d366ea4659e4d8704357272d6af102d6f64316b7f2a5\" returns successfully" May 10 00:50:45.559000 audit[4373]: AVC avc: denied { getattr } for pid=4373 comm="coredns" path="cgroup:[4026532361]" dev="nsfs" ino=4026532361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c953 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:50:45.559000 audit[4373]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a828 a2=c0004d2ac8 a3=0 items=0 ppid=4319 pid=4373 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c953 key=(null) May 10 00:50:45.559000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:50:45.682127 env[1711]: time="2025-05-10T00:50:45.681628620Z" level=info msg="StopPodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\"" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.829 [INFO][4405] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.829 [INFO][4405] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" iface="eth0" netns="/var/run/netns/cni-90afc119-6092-d9e1-0190-d24f76ac9959" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.830 [INFO][4405] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" iface="eth0" netns="/var/run/netns/cni-90afc119-6092-d9e1-0190-d24f76ac9959" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.830 [INFO][4405] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" iface="eth0" netns="/var/run/netns/cni-90afc119-6092-d9e1-0190-d24f76ac9959" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.830 [INFO][4405] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.830 [INFO][4405] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.890 [INFO][4412] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.891 [INFO][4412] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.891 [INFO][4412] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.899 [WARNING][4412] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.899 [INFO][4412] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.901 [INFO][4412] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:45.907823 env[1711]: 2025-05-10 00:50:45.905 [INFO][4405] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:50:45.909094 env[1711]: time="2025-05-10T00:50:45.909052461Z" level=info msg="TearDown network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" successfully" May 10 00:50:45.909215 env[1711]: time="2025-05-10T00:50:45.909194885Z" level=info msg="StopPodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" returns successfully" May 10 00:50:45.910145 env[1711]: time="2025-05-10T00:50:45.910113855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-r928m,Uid:7cb46bd7-f6f0-4f40-bba9-9a82d00084f3,Namespace:calico-apiserver,Attempt:1,}" May 10 00:50:46.005110 kubelet[2592]: I0510 00:50:46.004962 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-pbhpv" podStartSLOduration=32.004927325 podStartE2EDuration="32.004927325s" podCreationTimestamp="2025-05-10 00:50:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:45.981992937 +0000 UTC m=+36.555919752" watchObservedRunningTime="2025-05-10 00:50:46.004927325 +0000 UTC m=+36.578854137" May 10 00:50:46.118094 systemd[1]: run-netns-cni\x2d90afc119\x2d6092\x2dd9e1\x2d0190\x2dd24f76ac9959.mount: Deactivated successfully. May 10 00:50:46.128000 audit[4438]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:46.128000 audit[4438]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff9965bab0 a2=0 a3=7fff9965ba9c items=0 ppid=2761 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:46.134000 audit[4438]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:46.134000 audit[4438]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff9965bab0 a2=0 a3=0 items=0 ppid=2761 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:46.183555 systemd-networkd[1442]: cali98c7ea9e96b: Link UP May 10 00:50:46.187748 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:46.187880 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali98c7ea9e96b: link becomes ready May 10 00:50:46.190480 systemd-networkd[1442]: cali98c7ea9e96b: Gained carrier May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.046 [INFO][4418] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0 calico-apiserver-7d74784d74- calico-apiserver 7cb46bd7-f6f0-4f40-bba9-9a82d00084f3 769 0 2025-05-10 00:50:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7d74784d74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-58 calico-apiserver-7d74784d74-r928m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali98c7ea9e96b [] []}} ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.046 [INFO][4418] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.100 [INFO][4431] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.128 [INFO][4431] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ed80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-58", "pod":"calico-apiserver-7d74784d74-r928m", "timestamp":"2025-05-10 00:50:46.100666741 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.128 [INFO][4431] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.128 [INFO][4431] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.128 [INFO][4431] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.132 [INFO][4431] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.138 [INFO][4431] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.144 [INFO][4431] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.148 [INFO][4431] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.150 [INFO][4431] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.150 [INFO][4431] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.153 [INFO][4431] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.163 [INFO][4431] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.174 [INFO][4431] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.195/26] block=192.168.101.192/26 handle="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.174 [INFO][4431] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.195/26] handle="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" host="ip-172-31-28-58" May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.174 [INFO][4431] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:46.220526 env[1711]: 2025-05-10 00:50:46.174 [INFO][4431] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.195/26] IPv6=[] ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.221614 env[1711]: 2025-05-10 00:50:46.177 [INFO][4418] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"calico-apiserver-7d74784d74-r928m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali98c7ea9e96b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:46.221614 env[1711]: 2025-05-10 00:50:46.178 [INFO][4418] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.195/32] ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.221614 env[1711]: 2025-05-10 00:50:46.178 [INFO][4418] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali98c7ea9e96b ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.221614 env[1711]: 2025-05-10 00:50:46.190 [INFO][4418] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.221614 env[1711]: 2025-05-10 00:50:46.191 [INFO][4418] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b", Pod:"calico-apiserver-7d74784d74-r928m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali98c7ea9e96b", MAC:"b6:f6:71:0b:71:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:46.221614 env[1711]: 2025-05-10 00:50:46.215 [INFO][4418] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Namespace="calico-apiserver" Pod="calico-apiserver-7d74784d74-r928m" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:50:46.242000 audit[4447]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:46.242000 audit[4447]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffeadb17b50 a2=0 a3=7ffeadb17b3c items=0 ppid=3947 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.242000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:46.286773 env[1711]: time="2025-05-10T00:50:46.285657175Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:46.286773 env[1711]: time="2025-05-10T00:50:46.285729374Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:46.286773 env[1711]: time="2025-05-10T00:50:46.285746904Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:46.286773 env[1711]: time="2025-05-10T00:50:46.286062833Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b pid=4460 runtime=io.containerd.runc.v2 May 10 00:50:46.331917 systemd-networkd[1442]: calibfa02c1c7fb: Gained IPv6LL May 10 00:50:46.338869 systemd[1]: Started cri-containerd-e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b.scope. May 10 00:50:46.342413 systemd[1]: run-containerd-runc-k8s.io-e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b-runc.TFvR2V.mount: Deactivated successfully. May 10 00:50:46.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.373000 audit: BPF prog-id=173 op=LOAD May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4460 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613434653238316132363933336261623865663037353836356436 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4460 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613434653238316132363933336261623865663037353836356436 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit: BPF prog-id=174 op=LOAD May 10 00:50:46.374000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028aec0 items=0 ppid=4460 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613434653238316132363933336261623865663037353836356436 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit: BPF prog-id=175 op=LOAD May 10 00:50:46.374000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028af08 items=0 ppid=4460 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613434653238316132363933336261623865663037353836356436 May 10 00:50:46.374000 audit: BPF prog-id=175 op=UNLOAD May 10 00:50:46.374000 audit: BPF prog-id=174 op=UNLOAD May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:46.374000 audit: BPF prog-id=176 op=LOAD May 10 00:50:46.374000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028b318 items=0 ppid=4460 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537613434653238316132363933336261623865663037353836356436 May 10 00:50:46.432309 env[1711]: time="2025-05-10T00:50:46.432259227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7d74784d74-r928m,Uid:7cb46bd7-f6f0-4f40-bba9-9a82d00084f3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\"" May 10 00:50:46.683553 env[1711]: time="2025-05-10T00:50:46.679452960Z" level=info msg="StopPodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\"" May 10 00:50:46.697326 env[1711]: time="2025-05-10T00:50:46.697275552Z" level=info msg="StopPodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\"" May 10 00:50:46.841188 systemd-networkd[1442]: calie5cf9a59240: Gained IPv6LL May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.835 [INFO][4526] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.835 [INFO][4526] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" iface="eth0" netns="/var/run/netns/cni-2880dc09-5209-c12d-7d40-9e7a04cfecca" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.836 [INFO][4526] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" iface="eth0" netns="/var/run/netns/cni-2880dc09-5209-c12d-7d40-9e7a04cfecca" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.836 [INFO][4526] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" iface="eth0" netns="/var/run/netns/cni-2880dc09-5209-c12d-7d40-9e7a04cfecca" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.836 [INFO][4526] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.836 [INFO][4526] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.915 [INFO][4539] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.929 [INFO][4539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.929 [INFO][4539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.942 [WARNING][4539] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.942 [INFO][4539] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.945 [INFO][4539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:46.961759 env[1711]: 2025-05-10 00:50:46.951 [INFO][4526] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:50:46.961759 env[1711]: time="2025-05-10T00:50:46.957735052Z" level=info msg="TearDown network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" successfully" May 10 00:50:46.961759 env[1711]: time="2025-05-10T00:50:46.957779402Z" level=info msg="StopPodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" returns successfully" May 10 00:50:46.961759 env[1711]: time="2025-05-10T00:50:46.959619189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-62t5d,Uid:a65a8624-5006-4401-a7ce-37fb7636b1b0,Namespace:kube-system,Attempt:1,}" May 10 00:50:46.957351 systemd[1]: run-netns-cni\x2d2880dc09\x2d5209\x2dc12d\x2d7d40\x2d9e7a04cfecca.mount: Deactivated successfully. May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.866 [INFO][4530] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.866 [INFO][4530] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" iface="eth0" netns="/var/run/netns/cni-aab49f66-71a8-39e8-1d6e-7da14cbc1514" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.867 [INFO][4530] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" iface="eth0" netns="/var/run/netns/cni-aab49f66-71a8-39e8-1d6e-7da14cbc1514" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.868 [INFO][4530] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" iface="eth0" netns="/var/run/netns/cni-aab49f66-71a8-39e8-1d6e-7da14cbc1514" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.868 [INFO][4530] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.869 [INFO][4530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.924 [INFO][4544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.924 [INFO][4544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.945 [INFO][4544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.972 [WARNING][4544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.972 [INFO][4544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.981 [INFO][4544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:46.986707 env[1711]: 2025-05-10 00:50:46.983 [INFO][4530] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:50:46.988459 env[1711]: time="2025-05-10T00:50:46.986924503Z" level=info msg="TearDown network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" successfully" May 10 00:50:46.988459 env[1711]: time="2025-05-10T00:50:46.986958910Z" level=info msg="StopPodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" returns successfully" May 10 00:50:46.988459 env[1711]: time="2025-05-10T00:50:46.987693583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-22cln,Uid:c56cf48b-d193-4367-960c-062b280b8403,Namespace:calico-system,Attempt:1,}" May 10 00:50:47.039000 audit[4560]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.039000 audit[4560]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe84c94860 a2=0 a3=7ffe84c9484c items=0 ppid=2761 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.043000 audit[4560]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=4560 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:47.043000 audit[4560]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe84c94860 a2=0 a3=7ffe84c9484c items=0 ppid=2761 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:47.117630 systemd[1]: run-netns-cni\x2daab49f66\x2d71a8\x2d39e8\x2d1d6e\x2d7da14cbc1514.mount: Deactivated successfully. May 10 00:50:47.219280 systemd-networkd[1442]: cali5a2d5d5b0b3: Link UP May 10 00:50:47.224081 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:47.224161 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a2d5d5b0b3: link becomes ready May 10 00:50:47.223880 systemd-networkd[1442]: cali5a2d5d5b0b3: Gained carrier May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.089 [INFO][4561] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0 coredns-668d6bf9bc- kube-system a65a8624-5006-4401-a7ce-37fb7636b1b0 784 0 2025-05-10 00:50:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-28-58 coredns-668d6bf9bc-62t5d eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5a2d5d5b0b3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.090 [INFO][4561] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.166 [INFO][4583] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" HandleID="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.182 [INFO][4583] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" HandleID="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ed790), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-28-58", "pod":"coredns-668d6bf9bc-62t5d", "timestamp":"2025-05-10 00:50:47.166745388 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.182 [INFO][4583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.182 [INFO][4583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.182 [INFO][4583] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.184 [INFO][4583] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.189 [INFO][4583] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.194 [INFO][4583] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.196 [INFO][4583] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.198 [INFO][4583] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.198 [INFO][4583] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.199 [INFO][4583] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.206 [INFO][4583] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.214 [INFO][4583] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.196/26] block=192.168.101.192/26 handle="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.214 [INFO][4583] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.196/26] handle="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" host="ip-172-31-28-58" May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.214 [INFO][4583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.254877 env[1711]: 2025-05-10 00:50:47.214 [INFO][4583] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.196/26] IPv6=[] ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" HandleID="k8s-pod-network.64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.255929 env[1711]: 2025-05-10 00:50:47.216 [INFO][4561] cni-plugin/k8s.go 386: Populated endpoint ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a65a8624-5006-4401-a7ce-37fb7636b1b0", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"coredns-668d6bf9bc-62t5d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a2d5d5b0b3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.255929 env[1711]: 2025-05-10 00:50:47.216 [INFO][4561] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.196/32] ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.255929 env[1711]: 2025-05-10 00:50:47.217 [INFO][4561] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a2d5d5b0b3 ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.255929 env[1711]: 2025-05-10 00:50:47.224 [INFO][4561] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.255929 env[1711]: 2025-05-10 00:50:47.228 [INFO][4561] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a65a8624-5006-4401-a7ce-37fb7636b1b0", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa", Pod:"coredns-668d6bf9bc-62t5d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a2d5d5b0b3", MAC:"7a:fc:9b:18:cc:15", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.255929 env[1711]: 2025-05-10 00:50:47.241 [INFO][4561] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa" Namespace="kube-system" Pod="coredns-668d6bf9bc-62t5d" WorkloadEndpoint="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:50:47.266000 audit[4607]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4607 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:47.266000 audit[4607]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffc11d2be30 a2=0 a3=7ffc11d2be1c items=0 ppid=3947 pid=4607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.266000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:47.314469 env[1711]: time="2025-05-10T00:50:47.314384402Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:47.314832 env[1711]: time="2025-05-10T00:50:47.314693883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:47.315128 env[1711]: time="2025-05-10T00:50:47.315098296Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:47.315487 env[1711]: time="2025-05-10T00:50:47.315442905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa pid=4618 runtime=io.containerd.runc.v2 May 10 00:50:47.373348 systemd[1]: Started cri-containerd-64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa.scope. May 10 00:50:47.383304 systemd[1]: run-containerd-runc-k8s.io-64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa-runc.J2GqdK.mount: Deactivated successfully. May 10 00:50:47.411800 systemd-networkd[1442]: cali0761bcf2692: Link UP May 10 00:50:47.419156 systemd-networkd[1442]: cali0761bcf2692: Gained carrier May 10 00:50:47.419877 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0761bcf2692: link becomes ready May 10 00:50:47.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.452000 audit: BPF prog-id=177 op=LOAD May 10 00:50:47.453000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.453000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4618 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663861613239666530386261633839336265316565343835393064 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4618 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663861613239666530386261633839336265316565343835393064 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.454000 audit: BPF prog-id=178 op=LOAD May 10 00:50:47.454000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002139c0 items=0 ppid=4618 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663861613239666530386261633839336265316565343835393064 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.455000 audit: BPF prog-id=179 op=LOAD May 10 00:50:47.455000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000213a08 items=0 ppid=4618 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663861613239666530386261633839336265316565343835393064 May 10 00:50:47.456000 audit: BPF prog-id=179 op=UNLOAD May 10 00:50:47.456000 audit: BPF prog-id=178 op=UNLOAD May 10 00:50:47.456000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.456000 audit: BPF prog-id=180 op=LOAD May 10 00:50:47.456000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000213e18 items=0 ppid=4618 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663861613239666530386261633839336265316565343835393064 May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.144 [INFO][4572] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0 csi-node-driver- calico-system c56cf48b-d193-4367-960c-062b280b8403 785 0 2025-05-10 00:50:21 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5b5cc68cd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-28-58 csi-node-driver-22cln eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0761bcf2692 [] []}} ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.145 [INFO][4572] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.247 [INFO][4592] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" HandleID="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.279 [INFO][4592] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" HandleID="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312d70), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-58", "pod":"csi-node-driver-22cln", "timestamp":"2025-05-10 00:50:47.24729091 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.279 [INFO][4592] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.279 [INFO][4592] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.279 [INFO][4592] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.286 [INFO][4592] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.292 [INFO][4592] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.296 [INFO][4592] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.297 [INFO][4592] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.299 [INFO][4592] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.299 [INFO][4592] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.301 [INFO][4592] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0 May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.322 [INFO][4592] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.401 [INFO][4592] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.197/26] block=192.168.101.192/26 handle="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.401 [INFO][4592] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.197/26] handle="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" host="ip-172-31-28-58" May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.401 [INFO][4592] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.484214 env[1711]: 2025-05-10 00:50:47.401 [INFO][4592] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.197/26] IPv6=[] ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" HandleID="k8s-pod-network.4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.485823 env[1711]: 2025-05-10 00:50:47.407 [INFO][4572] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c56cf48b-d193-4367-960c-062b280b8403", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"csi-node-driver-22cln", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0761bcf2692", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.485823 env[1711]: 2025-05-10 00:50:47.407 [INFO][4572] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.197/32] ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.485823 env[1711]: 2025-05-10 00:50:47.407 [INFO][4572] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0761bcf2692 ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.485823 env[1711]: 2025-05-10 00:50:47.415 [INFO][4572] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.485823 env[1711]: 2025-05-10 00:50:47.420 [INFO][4572] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c56cf48b-d193-4367-960c-062b280b8403", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0", Pod:"csi-node-driver-22cln", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0761bcf2692", MAC:"de:c1:e3:d0:d5:dd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:47.485823 env[1711]: 2025-05-10 00:50:47.475 [INFO][4572] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0" Namespace="calico-system" Pod="csi-node-driver-22cln" WorkloadEndpoint="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:50:47.560048 env[1711]: time="2025-05-10T00:50:47.559976116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:47.560270 env[1711]: time="2025-05-10T00:50:47.560243505Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:47.560370 env[1711]: time="2025-05-10T00:50:47.560349828Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:47.560634 env[1711]: time="2025-05-10T00:50:47.560603329Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0 pid=4665 runtime=io.containerd.runc.v2 May 10 00:50:47.609047 systemd[1]: Started cri-containerd-4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0.scope. May 10 00:50:47.654972 env[1711]: time="2025-05-10T00:50:47.654923390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-62t5d,Uid:a65a8624-5006-4401-a7ce-37fb7636b1b0,Namespace:kube-system,Attempt:1,} returns sandbox id \"64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa\"" May 10 00:50:47.661566 env[1711]: time="2025-05-10T00:50:47.661532779Z" level=info msg="CreateContainer within sandbox \"64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:50:47.685707 env[1711]: time="2025-05-10T00:50:47.685661121Z" level=info msg="StopPodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\"" May 10 00:50:47.687101 env[1711]: time="2025-05-10T00:50:47.687040145Z" level=info msg="CreateContainer within sandbox \"64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1909d7c007269c94a3e8f1d644e3516b7e5ad72a404c92ef796a8c473f80ffd2\"" May 10 00:50:47.687622 env[1711]: time="2025-05-10T00:50:47.687583180Z" level=info msg="StartContainer for \"1909d7c007269c94a3e8f1d644e3516b7e5ad72a404c92ef796a8c473f80ffd2\"" May 10 00:50:47.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.712000 audit: BPF prog-id=181 op=LOAD May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323165616264643331373232373835643432343363663434656566 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323165616264643331373232373835643432343363663434656566 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit: BPF prog-id=182 op=LOAD May 10 00:50:47.714000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292350 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323165616264643331373232373835643432343363663434656566 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit: BPF prog-id=183 op=LOAD May 10 00:50:47.714000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000292398 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323165616264643331373232373835643432343363663434656566 May 10 00:50:47.714000 audit: BPF prog-id=183 op=UNLOAD May 10 00:50:47.714000 audit: BPF prog-id=182 op=UNLOAD May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.714000 audit: BPF prog-id=184 op=LOAD May 10 00:50:47.714000 audit[4675]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002927a8 items=0 ppid=4665 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323165616264643331373232373835643432343363663434656566 May 10 00:50:47.737008 systemd-networkd[1442]: cali98c7ea9e96b: Gained IPv6LL May 10 00:50:47.750924 env[1711]: time="2025-05-10T00:50:47.750872894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-22cln,Uid:c56cf48b-d193-4367-960c-062b280b8403,Namespace:calico-system,Attempt:1,} returns sandbox id \"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0\"" May 10 00:50:47.755000 audit[4729]: NETFILTER_CFG table=filter:109 family=2 entries=50 op=nft_register_chain pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:47.755000 audit[4729]: SYSCALL arch=c000003e syscall=46 success=yes exit=23900 a0=3 a1=7ffc4b1b6120 a2=0 a3=7ffc4b1b610c items=0 ppid=3947 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.755000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:47.764196 systemd[1]: Started cri-containerd-1909d7c007269c94a3e8f1d644e3516b7e5ad72a404c92ef796a8c473f80ffd2.scope. May 10 00:50:47.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit: BPF prog-id=185 op=LOAD May 10 00:50:47.797000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4618 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303964376330303732363963393461336538663164363434653335 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4618 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303964376330303732363963393461336538663164363434653335 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.797000 audit: BPF prog-id=186 op=LOAD May 10 00:50:47.797000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000363540 items=0 ppid=4618 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303964376330303732363963393461336538663164363434653335 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit: BPF prog-id=187 op=LOAD May 10 00:50:47.798000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000363588 items=0 ppid=4618 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303964376330303732363963393461336538663164363434653335 May 10 00:50:47.798000 audit: BPF prog-id=187 op=UNLOAD May 10 00:50:47.798000 audit: BPF prog-id=186 op=UNLOAD May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { perfmon } for pid=4731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit[4731]: AVC avc: denied { bpf } for pid=4731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:47.798000 audit: BPF prog-id=188 op=LOAD May 10 00:50:47.798000 audit[4731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000363998 items=0 ppid=4618 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139303964376330303732363963393461336538663164363434653335 May 10 00:50:47.826447 env[1711]: time="2025-05-10T00:50:47.826402743Z" level=info msg="StartContainer for \"1909d7c007269c94a3e8f1d644e3516b7e5ad72a404c92ef796a8c473f80ffd2\" returns successfully" May 10 00:50:47.841000 audit[4742]: AVC avc: denied { getattr } for pid=4742 comm="coredns" path="cgroup:[4026532599]" dev="nsfs" ino=4026532599 scontext=system_u:system_r:svirt_lxc_net_t:s0:c135,c629 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 10 00:50:47.841000 audit[4742]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a3a8 a2=c00069e928 a3=0 items=0 ppid=4618 pid=4742 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c135,c629 key=(null) May 10 00:50:47.841000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.895 [INFO][4730] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.895 [INFO][4730] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" iface="eth0" netns="/var/run/netns/cni-df1e4d5d-53b6-ad68-63fe-fba1263cfb2b" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.895 [INFO][4730] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" iface="eth0" netns="/var/run/netns/cni-df1e4d5d-53b6-ad68-63fe-fba1263cfb2b" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.895 [INFO][4730] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" iface="eth0" netns="/var/run/netns/cni-df1e4d5d-53b6-ad68-63fe-fba1263cfb2b" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.895 [INFO][4730] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.895 [INFO][4730] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.928 [INFO][4767] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.929 [INFO][4767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.929 [INFO][4767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.935 [WARNING][4767] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.935 [INFO][4767] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.936 [INFO][4767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:47.940067 env[1711]: 2025-05-10 00:50:47.938 [INFO][4730] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:50:47.941196 env[1711]: time="2025-05-10T00:50:47.940370063Z" level=info msg="TearDown network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" successfully" May 10 00:50:47.941196 env[1711]: time="2025-05-10T00:50:47.940398739Z" level=info msg="StopPodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" returns successfully" May 10 00:50:47.941470 env[1711]: time="2025-05-10T00:50:47.941447478Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546f75ff6-xjxxm,Uid:cda7d11e-b129-49dd-a536-d25c8eed1b8c,Namespace:calico-apiserver,Attempt:1,}" May 10 00:50:48.053577 kubelet[2592]: I0510 00:50:48.040174 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-62t5d" podStartSLOduration=34.039191156 podStartE2EDuration="34.039191156s" podCreationTimestamp="2025-05-10 00:50:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:48.034925762 +0000 UTC m=+38.608852576" watchObservedRunningTime="2025-05-10 00:50:48.039191156 +0000 UTC m=+38.613117972" May 10 00:50:48.107000 audit[4791]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.107000 audit[4791]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff20ebbe30 a2=0 a3=7fff20ebbe1c items=0 ppid=2761 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.121000 audit[4791]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=4791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.126004 systemd[1]: run-netns-cni\x2ddf1e4d5d\x2d53b6\x2dad68\x2d63fe\x2dfba1263cfb2b.mount: Deactivated successfully. May 10 00:50:48.121000 audit[4791]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff20ebbe30 a2=0 a3=7fff20ebbe1c items=0 ppid=2761 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.155099 env[1711]: time="2025-05-10T00:50:48.155065397Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.155000 audit[4796]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.155000 audit[4796]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe647a7cb0 a2=0 a3=7ffe647a7c9c items=0 ppid=2761 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.166327 env[1711]: time="2025-05-10T00:50:48.166283729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.174183 env[1711]: time="2025-05-10T00:50:48.174133393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.178485 env[1711]: time="2025-05-10T00:50:48.178443753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.179555 env[1711]: time="2025-05-10T00:50:48.179020365Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:50:48.183136 env[1711]: time="2025-05-10T00:50:48.183103092Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:50:48.189000 audit[4796]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:48.189000 audit[4796]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe647a7cb0 a2=0 a3=7ffe647a7c9c items=0 ppid=2761 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:48.196080 env[1711]: time="2025-05-10T00:50:48.195250202Z" level=info msg="CreateContainer within sandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:48.207072 systemd-networkd[1442]: cali8742a52f1f1: Link UP May 10 00:50:48.209847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8742a52f1f1: link becomes ready May 10 00:50:48.209671 systemd-networkd[1442]: cali8742a52f1f1: Gained carrier May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.022 [INFO][4773] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0 calico-apiserver-7546f75ff6- calico-apiserver cda7d11e-b129-49dd-a536-d25c8eed1b8c 802 0 2025-05-10 00:50:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7546f75ff6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-58 calico-apiserver-7546f75ff6-xjxxm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8742a52f1f1 [] []}} ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.022 [INFO][4773] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.132 [INFO][4786] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" HandleID="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.143 [INFO][4786] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" HandleID="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000285340), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-58", "pod":"calico-apiserver-7546f75ff6-xjxxm", "timestamp":"2025-05-10 00:50:48.132049058 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.143 [INFO][4786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.143 [INFO][4786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.143 [INFO][4786] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.145 [INFO][4786] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.153 [INFO][4786] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.161 [INFO][4786] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.164 [INFO][4786] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.171 [INFO][4786] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.171 [INFO][4786] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.175 [INFO][4786] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.180 [INFO][4786] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.196 [INFO][4786] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.198/26] block=192.168.101.192/26 handle="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.197 [INFO][4786] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.198/26] handle="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" host="ip-172-31-28-58" May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.197 [INFO][4786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:48.237071 env[1711]: 2025-05-10 00:50:48.197 [INFO][4786] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.198/26] IPv6=[] ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" HandleID="k8s-pod-network.9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.238643 env[1711]: 2025-05-10 00:50:48.202 [INFO][4773] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0", GenerateName:"calico-apiserver-7546f75ff6-", Namespace:"calico-apiserver", SelfLink:"", UID:"cda7d11e-b129-49dd-a536-d25c8eed1b8c", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546f75ff6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"calico-apiserver-7546f75ff6-xjxxm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8742a52f1f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:48.238643 env[1711]: 2025-05-10 00:50:48.202 [INFO][4773] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.198/32] ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.238643 env[1711]: 2025-05-10 00:50:48.202 [INFO][4773] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8742a52f1f1 ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.238643 env[1711]: 2025-05-10 00:50:48.211 [INFO][4773] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.238643 env[1711]: 2025-05-10 00:50:48.211 [INFO][4773] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0", GenerateName:"calico-apiserver-7546f75ff6-", Namespace:"calico-apiserver", SelfLink:"", UID:"cda7d11e-b129-49dd-a536-d25c8eed1b8c", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546f75ff6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd", Pod:"calico-apiserver-7546f75ff6-xjxxm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8742a52f1f1", MAC:"66:b1:d8:2f:24:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:48.238643 env[1711]: 2025-05-10 00:50:48.229 [INFO][4773] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-xjxxm" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:50:48.245868 env[1711]: time="2025-05-10T00:50:48.245818972Z" level=info msg="CreateContainer within sandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\"" May 10 00:50:48.247046 env[1711]: time="2025-05-10T00:50:48.247011871Z" level=info msg="StartContainer for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\"" May 10 00:50:48.266000 audit[4813]: NETFILTER_CFG table=filter:114 family=2 entries=50 op=nft_register_chain pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:48.266000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=25080 a0=3 a1=7ffdda93f630 a2=0 a3=7ffdda93f61c items=0 ppid=3947 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.266000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:48.277393 systemd[1]: Started cri-containerd-b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e.scope. May 10 00:50:48.308018 env[1711]: time="2025-05-10T00:50:48.304986257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:48.308288 env[1711]: time="2025-05-10T00:50:48.308225676Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:48.308429 env[1711]: time="2025-05-10T00:50:48.308401957Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:48.309471 env[1711]: time="2025-05-10T00:50:48.308869109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd pid=4841 runtime=io.containerd.runc.v2 May 10 00:50:48.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.315000 audit: BPF prog-id=189 op=LOAD May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4217 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353439656535373038313561343537326366303265383334653238 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4217 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353439656535373038313561343537326366303265383334653238 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit: BPF prog-id=190 op=LOAD May 10 00:50:48.316000 audit[4817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000253d00 items=0 ppid=4217 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353439656535373038313561343537326366303265383334653238 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit: BPF prog-id=191 op=LOAD May 10 00:50:48.316000 audit[4817]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000253d48 items=0 ppid=4217 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353439656535373038313561343537326366303265383334653238 May 10 00:50:48.316000 audit: BPF prog-id=191 op=UNLOAD May 10 00:50:48.316000 audit: BPF prog-id=190 op=UNLOAD May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.316000 audit: BPF prog-id=192 op=LOAD May 10 00:50:48.316000 audit[4817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c0158 items=0 ppid=4217 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353439656535373038313561343537326366303265383334653238 May 10 00:50:48.357477 systemd[1]: Started cri-containerd-9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd.scope. May 10 00:50:48.379199 systemd-networkd[1442]: cali5a2d5d5b0b3: Gained IPv6LL May 10 00:50:48.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.399000 audit: BPF prog-id=193 op=LOAD May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4841 pid=4858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961353738656635653630613462643836633739346232656462353639 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4841 pid=4858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961353738656635653630613462643836633739346232656462353639 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit: BPF prog-id=194 op=LOAD May 10 00:50:48.400000 audit[4858]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000311c20 items=0 ppid=4841 pid=4858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961353738656635653630613462643836633739346232656462353639 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit: BPF prog-id=195 op=LOAD May 10 00:50:48.400000 audit[4858]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000311c68 items=0 ppid=4841 pid=4858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961353738656635653630613462643836633739346232656462353639 May 10 00:50:48.400000 audit: BPF prog-id=195 op=UNLOAD May 10 00:50:48.400000 audit: BPF prog-id=194 op=UNLOAD May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { perfmon } for pid=4858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit[4858]: AVC avc: denied { bpf } for pid=4858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.400000 audit: BPF prog-id=196 op=LOAD May 10 00:50:48.400000 audit[4858]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000374078 items=0 ppid=4841 pid=4858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961353738656635653630613462643836633739346232656462353639 May 10 00:50:48.415742 env[1711]: time="2025-05-10T00:50:48.414247531Z" level=info msg="StartContainer for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" returns successfully" May 10 00:50:48.454215 env[1711]: time="2025-05-10T00:50:48.454166358Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546f75ff6-xjxxm,Uid:cda7d11e-b129-49dd-a536-d25c8eed1b8c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd\"" May 10 00:50:48.459362 env[1711]: time="2025-05-10T00:50:48.459312548Z" level=info msg="CreateContainer within sandbox \"9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:48.484905 env[1711]: time="2025-05-10T00:50:48.484848023Z" level=info msg="CreateContainer within sandbox \"9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"67c741ed7e98e3c8a2238cf8efc3d274c07a43f9f73cdcaba1e6ba1b26bebdc7\"" May 10 00:50:48.485703 env[1711]: time="2025-05-10T00:50:48.485656341Z" level=info msg="StartContainer for \"67c741ed7e98e3c8a2238cf8efc3d274c07a43f9f73cdcaba1e6ba1b26bebdc7\"" May 10 00:50:48.509614 systemd[1]: Started cri-containerd-67c741ed7e98e3c8a2238cf8efc3d274c07a43f9f73cdcaba1e6ba1b26bebdc7.scope. May 10 00:50:48.528982 env[1711]: time="2025-05-10T00:50:48.528938779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.534761 env[1711]: time="2025-05-10T00:50:48.534692069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.539204 env[1711]: time="2025-05-10T00:50:48.539169066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.543357 env[1711]: time="2025-05-10T00:50:48.543314220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:48.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.543000 audit: BPF prog-id=197 op=LOAD May 10 00:50:48.545178 env[1711]: time="2025-05-10T00:50:48.544557320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:50:48.544000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.544000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4841 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633734316564376539386533633861323233386366386566633364 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4841 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633734316564376539386533633861323233386366386566633364 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.545000 audit: BPF prog-id=198 op=LOAD May 10 00:50:48.545000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00009f250 items=0 ppid=4841 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633734316564376539386533633861323233386366386566633364 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.546000 audit: BPF prog-id=199 op=LOAD May 10 00:50:48.546000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00009f298 items=0 ppid=4841 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633734316564376539386533633861323233386366386566633364 May 10 00:50:48.547000 audit: BPF prog-id=199 op=UNLOAD May 10 00:50:48.547000 audit: BPF prog-id=198 op=UNLOAD May 10 00:50:48.547000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { perfmon } for pid=4901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit[4901]: AVC avc: denied { bpf } for pid=4901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.547000 audit: BPF prog-id=200 op=LOAD May 10 00:50:48.547000 audit[4901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00009f6a8 items=0 ppid=4841 pid=4901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637633734316564376539386533633861323233386366386566633364 May 10 00:50:48.550948 env[1711]: time="2025-05-10T00:50:48.550892447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:50:48.552434 env[1711]: time="2025-05-10T00:50:48.552381499Z" level=info msg="CreateContainer within sandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:48.589271 env[1711]: time="2025-05-10T00:50:48.582450888Z" level=info msg="CreateContainer within sandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\"" May 10 00:50:48.589786 env[1711]: time="2025-05-10T00:50:48.589748924Z" level=info msg="StartContainer for \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\"" May 10 00:50:48.607418 env[1711]: time="2025-05-10T00:50:48.607338307Z" level=info msg="StartContainer for \"67c741ed7e98e3c8a2238cf8efc3d274c07a43f9f73cdcaba1e6ba1b26bebdc7\" returns successfully" May 10 00:50:48.628108 systemd[1]: Started cri-containerd-57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113.scope. May 10 00:50:48.679472 env[1711]: time="2025-05-10T00:50:48.679425361Z" level=info msg="StopPodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\"" May 10 00:50:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit: BPF prog-id=201 op=LOAD May 10 00:50:48.711000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4460 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537636630653765613232376666613339383765643465616664636332 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4460 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537636630653765613232376666613339383765643465616664636332 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.711000 audit: BPF prog-id=202 op=LOAD May 10 00:50:48.711000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030c550 items=0 ppid=4460 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537636630653765613232376666613339383765643465616664636332 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit: BPF prog-id=203 op=LOAD May 10 00:50:48.712000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030c598 items=0 ppid=4460 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537636630653765613232376666613339383765643465616664636332 May 10 00:50:48.712000 audit: BPF prog-id=203 op=UNLOAD May 10 00:50:48.712000 audit: BPF prog-id=202 op=UNLOAD May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:48.712000 audit: BPF prog-id=204 op=LOAD May 10 00:50:48.712000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030c9a8 items=0 ppid=4460 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:48.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537636630653765613232376666613339383765643465616664636332 May 10 00:50:48.810980 env[1711]: time="2025-05-10T00:50:48.810873109Z" level=info msg="StartContainer for \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\" returns successfully" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.789 [INFO][4966] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.789 [INFO][4966] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" iface="eth0" netns="/var/run/netns/cni-68101e4e-d17d-248a-613a-0c38ef6976d2" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.790 [INFO][4966] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" iface="eth0" netns="/var/run/netns/cni-68101e4e-d17d-248a-613a-0c38ef6976d2" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.790 [INFO][4966] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" iface="eth0" netns="/var/run/netns/cni-68101e4e-d17d-248a-613a-0c38ef6976d2" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.790 [INFO][4966] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.790 [INFO][4966] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.861 [INFO][4974] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.862 [INFO][4974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.862 [INFO][4974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.885 [WARNING][4974] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.885 [INFO][4974] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.893 [INFO][4974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:48.902151 env[1711]: 2025-05-10 00:50:48.896 [INFO][4966] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:50:48.903334 env[1711]: time="2025-05-10T00:50:48.903280548Z" level=info msg="TearDown network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" successfully" May 10 00:50:48.903469 env[1711]: time="2025-05-10T00:50:48.903445522Z" level=info msg="StopPodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" returns successfully" May 10 00:50:48.904376 env[1711]: time="2025-05-10T00:50:48.904334659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4dc549b6-r5rcc,Uid:3e389aba-45af-41cb-8bb1-203d68ea6cb3,Namespace:calico-system,Attempt:1,}" May 10 00:50:49.020155 systemd-networkd[1442]: cali0761bcf2692: Gained IPv6LL May 10 00:50:49.073430 kubelet[2592]: I0510 00:50:49.073362 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d74784d74-7vsv5" podStartSLOduration=25.371072273 podStartE2EDuration="29.073339376s" podCreationTimestamp="2025-05-10 00:50:20 +0000 UTC" firstStartedPulling="2025-05-10 00:50:44.480365941 +0000 UTC m=+35.054292746" lastFinishedPulling="2025-05-10 00:50:48.18263305 +0000 UTC m=+38.756559849" observedRunningTime="2025-05-10 00:50:49.050841356 +0000 UTC m=+39.624768169" watchObservedRunningTime="2025-05-10 00:50:49.073339376 +0000 UTC m=+39.647266192" May 10 00:50:49.097661 kubelet[2592]: I0510 00:50:49.097595 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7d74784d74-r928m" podStartSLOduration=26.98164715 podStartE2EDuration="29.097574793s" podCreationTimestamp="2025-05-10 00:50:20 +0000 UTC" firstStartedPulling="2025-05-10 00:50:46.434049248 +0000 UTC m=+37.007976053" lastFinishedPulling="2025-05-10 00:50:48.549976891 +0000 UTC m=+39.123903696" observedRunningTime="2025-05-10 00:50:49.074351353 +0000 UTC m=+39.648278169" watchObservedRunningTime="2025-05-10 00:50:49.097574793 +0000 UTC m=+39.671501606" May 10 00:50:49.128000 audit[5014]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.128000 audit[5014]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc8d65b7e0 a2=0 a3=7ffc8d65b7cc items=0 ppid=2761 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.134620 systemd[1]: run-netns-cni\x2d68101e4e\x2dd17d\x2d248a\x2d613a\x2d0c38ef6976d2.mount: Deactivated successfully. May 10 00:50:49.137000 audit[5014]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:49.137000 audit[5014]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc8d65b7e0 a2=0 a3=7ffc8d65b7cc items=0 ppid=2761 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:49.229000 systemd-networkd[1442]: calie9be09c746f: Link UP May 10 00:50:49.234723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:50:49.234858 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie9be09c746f: link becomes ready May 10 00:50:49.235332 systemd-networkd[1442]: calie9be09c746f: Gained carrier May 10 00:50:49.259793 kubelet[2592]: I0510 00:50:49.259733 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7546f75ff6-xjxxm" podStartSLOduration=28.259696979 podStartE2EDuration="28.259696979s" podCreationTimestamp="2025-05-10 00:50:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:49.099068706 +0000 UTC m=+39.672995521" watchObservedRunningTime="2025-05-10 00:50:49.259696979 +0000 UTC m=+39.833623791" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.016 [INFO][4992] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0 calico-kube-controllers-7d4dc549b6- calico-system 3e389aba-45af-41cb-8bb1-203d68ea6cb3 823 0 2025-05-10 00:50:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7d4dc549b6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-28-58 calico-kube-controllers-7d4dc549b6-r5rcc eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calie9be09c746f [] []}} ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.017 [INFO][4992] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.116 [INFO][5007] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.158 [INFO][5007] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031db50), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-58", "pod":"calico-kube-controllers-7d4dc549b6-r5rcc", "timestamp":"2025-05-10 00:50:49.116681837 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.158 [INFO][5007] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.158 [INFO][5007] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.158 [INFO][5007] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.161 [INFO][5007] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.169 [INFO][5007] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.182 [INFO][5007] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.194 [INFO][5007] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.198 [INFO][5007] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.198 [INFO][5007] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.200 [INFO][5007] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.207 [INFO][5007] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.221 [INFO][5007] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.199/26] block=192.168.101.192/26 handle="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.222 [INFO][5007] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.199/26] handle="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" host="ip-172-31-28-58" May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.222 [INFO][5007] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:49.264463 env[1711]: 2025-05-10 00:50:49.222 [INFO][5007] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.199/26] IPv6=[] ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.266351 env[1711]: 2025-05-10 00:50:49.224 [INFO][4992] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0", GenerateName:"calico-kube-controllers-7d4dc549b6-", Namespace:"calico-system", SelfLink:"", UID:"3e389aba-45af-41cb-8bb1-203d68ea6cb3", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4dc549b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"calico-kube-controllers-7d4dc549b6-r5rcc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie9be09c746f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:49.266351 env[1711]: 2025-05-10 00:50:49.225 [INFO][4992] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.199/32] ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.266351 env[1711]: 2025-05-10 00:50:49.225 [INFO][4992] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie9be09c746f ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.266351 env[1711]: 2025-05-10 00:50:49.235 [INFO][4992] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.266351 env[1711]: 2025-05-10 00:50:49.235 [INFO][4992] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0", GenerateName:"calico-kube-controllers-7d4dc549b6-", Namespace:"calico-system", SelfLink:"", UID:"3e389aba-45af-41cb-8bb1-203d68ea6cb3", ResourceVersion:"823", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4dc549b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b", Pod:"calico-kube-controllers-7d4dc549b6-r5rcc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie9be09c746f", MAC:"1a:b2:91:a4:60:b6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:49.266351 env[1711]: 2025-05-10 00:50:49.261 [INFO][4992] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Namespace="calico-system" Pod="calico-kube-controllers-7d4dc549b6-r5rcc" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:50:49.288887 env[1711]: time="2025-05-10T00:50:49.288807348Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:49.289126 env[1711]: time="2025-05-10T00:50:49.289099437Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:49.289238 env[1711]: time="2025-05-10T00:50:49.289214735Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:49.289534 env[1711]: time="2025-05-10T00:50:49.289505157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b pid=5034 runtime=io.containerd.runc.v2 May 10 00:50:49.322814 systemd[1]: Started cri-containerd-d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b.scope. May 10 00:50:49.353960 systemd[1]: run-containerd-runc-k8s.io-d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b-runc.dOFz97.mount: Deactivated successfully. May 10 00:50:49.421484 kernel: kauditd_printk_skb: 671 callbacks suppressed May 10 00:50:49.421641 kernel: audit: type=1325 audit(1746838249.411:1297): table=filter:117 family=2 entries=60 op=nft_register_chain pid=5058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:49.421688 kernel: audit: type=1300 audit(1746838249.411:1297): arch=c000003e syscall=46 success=yes exit=27432 a0=3 a1=7ffc7652b4e0 a2=0 a3=7ffc7652b4cc items=0 ppid=3947 pid=5058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.411000 audit[5058]: NETFILTER_CFG table=filter:117 family=2 entries=60 op=nft_register_chain pid=5058 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:49.411000 audit[5058]: SYSCALL arch=c000003e syscall=46 success=yes exit=27432 a0=3 a1=7ffc7652b4e0 a2=0 a3=7ffc7652b4cc items=0 ppid=3947 pid=5058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.411000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:49.429740 kernel: audit: type=1327 audit(1746838249.411:1297): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:49.456735 kernel: audit: type=1400 audit(1746838249.449:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.456880 kernel: audit: type=1400 audit(1746838249.449:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.461742 kernel: audit: type=1400 audit(1746838249.449:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.468736 kernel: audit: type=1400 audit(1746838249.449:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.472739 kernel: audit: type=1400 audit(1746838249.449:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.488711 kernel: audit: type=1400 audit(1746838249.449:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.488896 kernel: audit: type=1400 audit(1746838249.449:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.456000 audit: BPF prog-id=205 op=LOAD May 10 00:50:49.457000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=5034 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376564373330336330303661313838646365353135613933393937 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=5034 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376564373330336330303661313838646365353135613933393937 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.457000 audit: BPF prog-id=206 op=LOAD May 10 00:50:49.457000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000380920 items=0 ppid=5034 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376564373330336330303661313838646365353135613933393937 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit: BPF prog-id=207 op=LOAD May 10 00:50:49.460000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000380968 items=0 ppid=5034 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376564373330336330303661313838646365353135613933393937 May 10 00:50:49.460000 audit: BPF prog-id=207 op=UNLOAD May 10 00:50:49.460000 audit: BPF prog-id=206 op=UNLOAD May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:49.460000 audit: BPF prog-id=208 op=LOAD May 10 00:50:49.460000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000380d78 items=0 ppid=5034 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:49.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376564373330336330303661313838646365353135613933393937 May 10 00:50:49.529017 systemd-networkd[1442]: cali8742a52f1f1: Gained IPv6LL May 10 00:50:49.567953 env[1711]: time="2025-05-10T00:50:49.567901901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4dc549b6-r5rcc,Uid:3e389aba-45af-41cb-8bb1-203d68ea6cb3,Namespace:calico-system,Attempt:1,} returns sandbox id \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\"" May 10 00:50:50.054002 kubelet[2592]: I0510 00:50:50.053959 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:50.055204 kubelet[2592]: I0510 00:50:50.055174 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:50.214000 audit[5073]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=5073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:50.214000 audit[5073]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd94c5e070 a2=0 a3=7ffd94c5e05c items=0 ppid=2761 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:50.217000 audit[5073]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:50.217000 audit[5073]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd94c5e070 a2=0 a3=7ffd94c5e05c items=0 ppid=2761 pid=5073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:50.260671 env[1711]: time="2025-05-10T00:50:50.260623479Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.271776 env[1711]: time="2025-05-10T00:50:50.271729403Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.279357 env[1711]: time="2025-05-10T00:50:50.279314178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.286375 env[1711]: time="2025-05-10T00:50:50.286329059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:50.287469 env[1711]: time="2025-05-10T00:50:50.287423994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:50:50.290150 env[1711]: time="2025-05-10T00:50:50.290119983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:50:50.291931 env[1711]: time="2025-05-10T00:50:50.291900104Z" level=info msg="CreateContainer within sandbox \"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:50:50.333270 env[1711]: time="2025-05-10T00:50:50.333168854Z" level=info msg="CreateContainer within sandbox \"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"758e05cd82b0230574e8137ecc9380afefad4a7031180afe4657a0a31c215f60\"" May 10 00:50:50.334298 env[1711]: time="2025-05-10T00:50:50.334264382Z" level=info msg="StartContainer for \"758e05cd82b0230574e8137ecc9380afefad4a7031180afe4657a0a31c215f60\"" May 10 00:50:50.397322 systemd[1]: run-containerd-runc-k8s.io-758e05cd82b0230574e8137ecc9380afefad4a7031180afe4657a0a31c215f60-runc.EulCrf.mount: Deactivated successfully. May 10 00:50:50.401396 systemd[1]: Started cri-containerd-758e05cd82b0230574e8137ecc9380afefad4a7031180afe4657a0a31c215f60.scope. May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f1d50708758 items=0 ppid=4665 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386530356364383262303233303537346538313337656363393338 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit: BPF prog-id=209 op=LOAD May 10 00:50:50.447000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00024bba8 items=0 ppid=4665 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386530356364383262303233303537346538313337656363393338 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit: BPF prog-id=210 op=LOAD May 10 00:50:50.447000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00024bbf8 items=0 ppid=4665 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386530356364383262303233303537346538313337656363393338 May 10 00:50:50.447000 audit: BPF prog-id=210 op=UNLOAD May 10 00:50:50.447000 audit: BPF prog-id=209 op=UNLOAD May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { perfmon } for pid=5081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit[5081]: AVC avc: denied { bpf } for pid=5081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:50.447000 audit: BPF prog-id=211 op=LOAD May 10 00:50:50.447000 audit[5081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00024bc88 items=0 ppid=4665 pid=5081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:50.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386530356364383262303233303537346538313337656363393338 May 10 00:50:50.487989 env[1711]: time="2025-05-10T00:50:50.487927310Z" level=info msg="StartContainer for \"758e05cd82b0230574e8137ecc9380afefad4a7031180afe4657a0a31c215f60\" returns successfully" May 10 00:50:50.744902 systemd-networkd[1442]: calie9be09c746f: Gained IPv6LL May 10 00:50:50.854000 audit[4913]: AVC avc: denied { watch } for pid=4913 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_31.2048085772/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c778 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c778 tclass=file permissive=0 May 10 00:50:50.854000 audit[4913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a597e0 a2=fc6 a3=0 items=0 ppid=4841 pid=4913 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c778 key=(null) May 10 00:50:50.854000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:50:50.990000 audit[4948]: AVC avc: denied { watch } for pid=4948 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_31.2276845756/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c711,c937 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c711,c937 tclass=file permissive=0 May 10 00:50:50.990000 audit[4948]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000424d40 a2=fc6 a3=0 items=0 ppid=4460 pid=4948 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c711,c937 key=(null) May 10 00:50:50.990000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:50:51.053632 kubelet[2592]: I0510 00:50:51.053593 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:51.085002 env[1711]: time="2025-05-10T00:50:51.084768710Z" level=info msg="StopContainer for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" with timeout 30 (s)" May 10 00:50:51.085408 env[1711]: time="2025-05-10T00:50:51.085290523Z" level=info msg="Stop container \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" with signal terminated" May 10 00:50:51.132549 systemd[1]: Created slice kubepods-besteffort-pod09ad6af3_ea24_4017_992c_a03b2b5723d5.slice. May 10 00:50:51.156036 systemd[1]: cri-containerd-b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e.scope: Deactivated successfully. May 10 00:50:51.155000 audit: BPF prog-id=189 op=UNLOAD May 10 00:50:51.161000 audit: BPF prog-id=192 op=UNLOAD May 10 00:50:51.188532 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e-rootfs.mount: Deactivated successfully. May 10 00:50:51.190858 env[1711]: time="2025-05-10T00:50:51.190807632Z" level=info msg="shim disconnected" id=b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e May 10 00:50:51.191077 env[1711]: time="2025-05-10T00:50:51.191058282Z" level=warning msg="cleaning up after shim disconnected" id=b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e namespace=k8s.io May 10 00:50:51.191158 env[1711]: time="2025-05-10T00:50:51.191147861Z" level=info msg="cleaning up dead shim" May 10 00:50:51.203319 env[1711]: time="2025-05-10T00:50:51.203271588Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5128 runtime=io.containerd.runc.v2\n" May 10 00:50:51.227432 kubelet[2592]: I0510 00:50:51.227384 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/09ad6af3-ea24-4017-992c-a03b2b5723d5-calico-apiserver-certs\") pod \"calico-apiserver-7546f75ff6-8b975\" (UID: \"09ad6af3-ea24-4017-992c-a03b2b5723d5\") " pod="calico-apiserver/calico-apiserver-7546f75ff6-8b975" May 10 00:50:51.227788 kubelet[2592]: I0510 00:50:51.227492 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q6ztt\" (UniqueName: \"kubernetes.io/projected/09ad6af3-ea24-4017-992c-a03b2b5723d5-kube-api-access-q6ztt\") pod \"calico-apiserver-7546f75ff6-8b975\" (UID: \"09ad6af3-ea24-4017-992c-a03b2b5723d5\") " pod="calico-apiserver/calico-apiserver-7546f75ff6-8b975" May 10 00:50:51.245000 audit[5143]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=5143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.245000 audit[5143]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc61278cc0 a2=0 a3=7ffc61278cac items=0 ppid=2761 pid=5143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.251048 env[1711]: time="2025-05-10T00:50:51.250997739Z" level=info msg="StopContainer for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" returns successfully" May 10 00:50:51.251900 env[1711]: time="2025-05-10T00:50:51.251864851Z" level=info msg="StopPodSandbox for \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\"" May 10 00:50:51.252028 env[1711]: time="2025-05-10T00:50:51.251927572Z" level=info msg="Container to stop \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:50:51.252000 audit[5143]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=5143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:51.252000 audit[5143]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc61278cc0 a2=0 a3=7ffc61278cac items=0 ppid=2761 pid=5143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:51.262621 systemd[1]: cri-containerd-55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5.scope: Deactivated successfully. May 10 00:50:51.262000 audit: BPF prog-id=161 op=UNLOAD May 10 00:50:51.267000 audit: BPF prog-id=164 op=UNLOAD May 10 00:50:51.302589 env[1711]: time="2025-05-10T00:50:51.302536166Z" level=info msg="shim disconnected" id=55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5 May 10 00:50:51.303309 env[1711]: time="2025-05-10T00:50:51.303280498Z" level=warning msg="cleaning up after shim disconnected" id=55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5 namespace=k8s.io May 10 00:50:51.303437 env[1711]: time="2025-05-10T00:50:51.303421203Z" level=info msg="cleaning up dead shim" May 10 00:50:51.319453 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5-rootfs.mount: Deactivated successfully. May 10 00:50:51.319595 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5-shm.mount: Deactivated successfully. May 10 00:50:51.323140 env[1711]: time="2025-05-10T00:50:51.323098790Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:50:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5164 runtime=io.containerd.runc.v2\n" May 10 00:50:51.442982 env[1711]: time="2025-05-10T00:50:51.442939304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546f75ff6-8b975,Uid:09ad6af3-ea24-4017-992c-a03b2b5723d5,Namespace:calico-apiserver,Attempt:0,}" May 10 00:50:51.517788 systemd-networkd[1442]: calibfa02c1c7fb: Link DOWN May 10 00:50:51.517797 systemd-networkd[1442]: calibfa02c1c7fb: Lost carrier May 10 00:50:51.628000 audit[5228]: NETFILTER_CFG table=filter:122 family=2 entries=48 op=nft_register_rule pid=5228 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:51.628000 audit[5228]: SYSCALL arch=c000003e syscall=46 success=yes exit=7756 a0=3 a1=7ffc7ec76480 a2=0 a3=7ffc7ec7646c items=0 ppid=3947 pid=5228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.628000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:51.630000 audit[5228]: NETFILTER_CFG table=filter:123 family=2 entries=2 op=nft_unregister_chain pid=5228 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:51.630000 audit[5228]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc7ec76480 a2=0 a3=5588cd779000 items=0 ppid=3947 pid=5228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.630000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.515 [INFO][5194] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.515 [INFO][5194] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" iface="eth0" netns="/var/run/netns/cni-ee7f19f3-9402-c340-5110-20e79c40b21b" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.515 [INFO][5194] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" iface="eth0" netns="/var/run/netns/cni-ee7f19f3-9402-c340-5110-20e79c40b21b" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.526 [INFO][5194] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" after=11.243273ms iface="eth0" netns="/var/run/netns/cni-ee7f19f3-9402-c340-5110-20e79c40b21b" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.526 [INFO][5194] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.526 [INFO][5194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.596 [INFO][5212] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.597 [INFO][5212] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.597 [INFO][5212] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.657 [INFO][5212] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.657 [INFO][5212] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.659 [INFO][5212] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:51.668542 env[1711]: 2025-05-10 00:50:51.664 [INFO][5194] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:50:51.669396 env[1711]: time="2025-05-10T00:50:51.669002152Z" level=info msg="TearDown network for sandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" successfully" May 10 00:50:51.669396 env[1711]: time="2025-05-10T00:50:51.669077940Z" level=info msg="StopPodSandbox for \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" returns successfully" May 10 00:50:51.670078 env[1711]: time="2025-05-10T00:50:51.670042207Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" May 10 00:50:51.723701 systemd-networkd[1442]: cali53225fbc81c: Link UP May 10 00:50:51.726664 systemd-networkd[1442]: cali53225fbc81c: Gained carrier May 10 00:50:51.726879 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali53225fbc81c: link becomes ready May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.563 [INFO][5198] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0 calico-apiserver-7546f75ff6- calico-apiserver 09ad6af3-ea24-4017-992c-a03b2b5723d5 875 0 2025-05-10 00:50:51 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7546f75ff6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-28-58 calico-apiserver-7546f75ff6-8b975 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali53225fbc81c [] []}} ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.564 [INFO][5198] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.628 [INFO][5221] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" HandleID="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.655 [INFO][5221] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" HandleID="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312af0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-28-58", "pod":"calico-apiserver-7546f75ff6-8b975", "timestamp":"2025-05-10 00:50:51.628279293 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.655 [INFO][5221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.659 [INFO][5221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.659 [INFO][5221] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.661 [INFO][5221] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.670 [INFO][5221] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.680 [INFO][5221] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.685 [INFO][5221] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.689 [INFO][5221] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.689 [INFO][5221] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.692 [INFO][5221] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244 May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.701 [INFO][5221] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.712 [INFO][5221] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.200/26] block=192.168.101.192/26 handle="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.712 [INFO][5221] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.200/26] handle="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" host="ip-172-31-28-58" May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.712 [INFO][5221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:51.776897 env[1711]: 2025-05-10 00:50:51.712 [INFO][5221] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.200/26] IPv6=[] ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" HandleID="k8s-pod-network.2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.777963 env[1711]: 2025-05-10 00:50:51.715 [INFO][5198] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0", GenerateName:"calico-apiserver-7546f75ff6-", Namespace:"calico-apiserver", SelfLink:"", UID:"09ad6af3-ea24-4017-992c-a03b2b5723d5", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546f75ff6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"calico-apiserver-7546f75ff6-8b975", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali53225fbc81c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:51.777963 env[1711]: 2025-05-10 00:50:51.715 [INFO][5198] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.200/32] ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.777963 env[1711]: 2025-05-10 00:50:51.715 [INFO][5198] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali53225fbc81c ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.777963 env[1711]: 2025-05-10 00:50:51.727 [INFO][5198] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.777963 env[1711]: 2025-05-10 00:50:51.727 [INFO][5198] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0", GenerateName:"calico-apiserver-7546f75ff6-", Namespace:"calico-apiserver", SelfLink:"", UID:"09ad6af3-ea24-4017-992c-a03b2b5723d5", ResourceVersion:"875", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546f75ff6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244", Pod:"calico-apiserver-7546f75ff6-8b975", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali53225fbc81c", MAC:"fa:b6:f2:fe:8d:be", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:51.777963 env[1711]: 2025-05-10 00:50:51.774 [INFO][5198] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244" Namespace="calico-apiserver" Pod="calico-apiserver-7546f75ff6-8b975" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--8b975-eth0" May 10 00:50:51.807830 env[1711]: time="2025-05-10T00:50:51.807750504Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:50:51.809692 env[1711]: time="2025-05-10T00:50:51.809629546Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:50:51.809974 env[1711]: time="2025-05-10T00:50:51.809930757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:50:51.810379 env[1711]: time="2025-05-10T00:50:51.810333159Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244 pid=5268 runtime=io.containerd.runc.v2 May 10 00:50:51.849933 systemd[1]: Started cri-containerd-2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244.scope. May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.822 [WARNING][5243] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"22e6394c-4593-4b80-96ed-9080e295c004", ResourceVersion:"878", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5", Pod:"calico-apiserver-7d74784d74-7vsv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibfa02c1c7fb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.823 [INFO][5243] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.823 [INFO][5243] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" iface="eth0" netns="" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.823 [INFO][5243] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.823 [INFO][5243] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.870 [INFO][5288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.871 [INFO][5288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.871 [INFO][5288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.898 [WARNING][5288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.898 [INFO][5288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.904 [INFO][5288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:51.911290 env[1711]: 2025-05-10 00:50:51.908 [INFO][5243] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:50:51.913123 env[1711]: time="2025-05-10T00:50:51.911975601Z" level=info msg="TearDown network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" successfully" May 10 00:50:51.913123 env[1711]: time="2025-05-10T00:50:51.912022530Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" returns successfully" May 10 00:50:51.923000 audit[5297]: NETFILTER_CFG table=filter:124 family=2 entries=56 op=nft_register_chain pid=5297 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:50:51.923000 audit[5297]: SYSCALL arch=c000003e syscall=46 success=yes exit=27916 a0=3 a1=7ffec60501c0 a2=0 a3=7ffec60501ac items=0 ppid=3947 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.923000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:50:51.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.957000 audit: BPF prog-id=212 op=LOAD May 10 00:50:51.958000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.958000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=5268 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383765393761616638656535306136643063613739336638303861 May 10 00:50:51.958000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.958000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=5268 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383765393761616638656535306136643063613739336638303861 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.959000 audit: BPF prog-id=213 op=LOAD May 10 00:50:51.959000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00038a7f0 items=0 ppid=5268 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383765393761616638656535306136643063613739336638303861 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit: BPF prog-id=214 op=LOAD May 10 00:50:51.960000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00038a838 items=0 ppid=5268 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383765393761616638656535306136643063613739336638303861 May 10 00:50:51.960000 audit: BPF prog-id=214 op=UNLOAD May 10 00:50:51.960000 audit: BPF prog-id=213 op=UNLOAD May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { perfmon } for pid=5280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit[5280]: AVC avc: denied { bpf } for pid=5280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:51.960000 audit: BPF prog-id=215 op=LOAD May 10 00:50:51.960000 audit[5280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00038ac48 items=0 ppid=5268 pid=5280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:51.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235383765393761616638656535306136643063613739336638303861 May 10 00:50:52.008859 env[1711]: time="2025-05-10T00:50:52.008777217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7546f75ff6-8b975,Uid:09ad6af3-ea24-4017-992c-a03b2b5723d5,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244\"" May 10 00:50:52.012411 env[1711]: time="2025-05-10T00:50:52.012373168Z" level=info msg="CreateContainer within sandbox \"2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:50:52.035344 env[1711]: time="2025-05-10T00:50:52.035289044Z" level=info msg="CreateContainer within sandbox \"2587e97aaf8ee50a6d0ca793f808a067f101f5f9f69a3dc90fe411f43487f244\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a379b8abcf93c6be685293df85d1ddaea07823cbb3d9ffa50b09ebb5ba01a8ed\"" May 10 00:50:52.036338 env[1711]: time="2025-05-10T00:50:52.036306159Z" level=info msg="StartContainer for \"a379b8abcf93c6be685293df85d1ddaea07823cbb3d9ffa50b09ebb5ba01a8ed\"" May 10 00:50:52.056249 kubelet[2592]: I0510 00:50:52.056175 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-x2w9v\" (UniqueName: \"kubernetes.io/projected/22e6394c-4593-4b80-96ed-9080e295c004-kube-api-access-x2w9v\") pod \"22e6394c-4593-4b80-96ed-9080e295c004\" (UID: \"22e6394c-4593-4b80-96ed-9080e295c004\") " May 10 00:50:52.056898 kubelet[2592]: I0510 00:50:52.056876 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/22e6394c-4593-4b80-96ed-9080e295c004-calico-apiserver-certs\") pod \"22e6394c-4593-4b80-96ed-9080e295c004\" (UID: \"22e6394c-4593-4b80-96ed-9080e295c004\") " May 10 00:50:52.068352 kubelet[2592]: I0510 00:50:52.068301 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/22e6394c-4593-4b80-96ed-9080e295c004-kube-api-access-x2w9v" (OuterVolumeSpecName: "kube-api-access-x2w9v") pod "22e6394c-4593-4b80-96ed-9080e295c004" (UID: "22e6394c-4593-4b80-96ed-9080e295c004"). InnerVolumeSpecName "kube-api-access-x2w9v". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 10 00:50:52.071467 kubelet[2592]: I0510 00:50:52.071425 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/22e6394c-4593-4b80-96ed-9080e295c004-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "22e6394c-4593-4b80-96ed-9080e295c004" (UID: "22e6394c-4593-4b80-96ed-9080e295c004"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 10 00:50:52.090220 kubelet[2592]: I0510 00:50:52.090184 2592 scope.go:117] "RemoveContainer" containerID="b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e" May 10 00:50:52.102681 systemd[1]: Started cri-containerd-a379b8abcf93c6be685293df85d1ddaea07823cbb3d9ffa50b09ebb5ba01a8ed.scope. May 10 00:50:52.115921 systemd[1]: Removed slice kubepods-besteffort-pod22e6394c_4593_4b80_96ed_9080e295c004.slice. May 10 00:50:52.116099 systemd[1]: kubepods-besteffort-pod22e6394c_4593_4b80_96ed_9080e295c004.slice: Consumed 1.003s CPU time. May 10 00:50:52.120427 env[1711]: time="2025-05-10T00:50:52.120390084Z" level=info msg="RemoveContainer for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\"" May 10 00:50:52.130450 env[1711]: time="2025-05-10T00:50:52.130401094Z" level=info msg="RemoveContainer for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" returns successfully" May 10 00:50:52.140953 kubelet[2592]: I0510 00:50:52.140913 2592 scope.go:117] "RemoveContainer" containerID="b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e" May 10 00:50:52.141895 env[1711]: time="2025-05-10T00:50:52.141662981Z" level=error msg="ContainerStatus for \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\": not found" May 10 00:50:52.143367 kubelet[2592]: E0510 00:50:52.143322 2592 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\": not found" containerID="b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e" May 10 00:50:52.143575 kubelet[2592]: I0510 00:50:52.143540 2592 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e"} err="failed to get container status \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\": rpc error: code = NotFound desc = an error occurred when try to find container \"b1549ee570815a4572cf02e834e28490492379ec16dd9477d7f0926b2cd3cf8e\": not found" May 10 00:50:52.160048 kubelet[2592]: I0510 00:50:52.158750 2592 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-x2w9v\" (UniqueName: \"kubernetes.io/projected/22e6394c-4593-4b80-96ed-9080e295c004-kube-api-access-x2w9v\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:50:52.160048 kubelet[2592]: I0510 00:50:52.158787 2592 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/22e6394c-4593-4b80-96ed-9080e295c004-calico-apiserver-certs\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:50:52.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.219000 audit: BPF prog-id=216 op=LOAD May 10 00:50:52.224000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5268 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373962386162636639336336626536383532393364663835643164 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=5268 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373962386162636639336336626536383532393364663835643164 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.224000 audit: BPF prog-id=217 op=LOAD May 10 00:50:52.224000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002eac20 items=0 ppid=5268 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373962386162636639336336626536383532393364663835643164 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit: BPF prog-id=218 op=LOAD May 10 00:50:52.225000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002eac68 items=0 ppid=5268 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373962386162636639336336626536383532393364663835643164 May 10 00:50:52.225000 audit: BPF prog-id=218 op=UNLOAD May 10 00:50:52.225000 audit: BPF prog-id=217 op=UNLOAD May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { perfmon } for pid=5323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit[5323]: AVC avc: denied { bpf } for pid=5323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:52.225000 audit: BPF prog-id=219 op=LOAD May 10 00:50:52.225000 audit[5323]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002eb078 items=0 ppid=5268 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373962386162636639336336626536383532393364663835643164 May 10 00:50:52.282000 audit[5343]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:52.282000 audit[5343]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe23892d60 a2=0 a3=7ffe23892d4c items=0 ppid=2761 pid=5343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:52.288000 audit[5343]: NETFILTER_CFG table=nat:126 family=2 entries=30 op=nft_register_rule pid=5343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:52.288000 audit[5343]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe23892d60 a2=0 a3=7ffe23892d4c items=0 ppid=2761 pid=5343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:52.321619 systemd[1]: run-netns-cni\x2dee7f19f3\x2d9402\x2dc340\x2d5110\x2d20e79c40b21b.mount: Deactivated successfully. May 10 00:50:52.321767 systemd[1]: var-lib-kubelet-pods-22e6394c\x2d4593\x2d4b80\x2d96ed\x2d9080e295c004-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dx2w9v.mount: Deactivated successfully. May 10 00:50:52.323964 systemd[1]: var-lib-kubelet-pods-22e6394c\x2d4593\x2d4b80\x2d96ed\x2d9080e295c004-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:50:52.342145 env[1711]: time="2025-05-10T00:50:52.342081205Z" level=info msg="StartContainer for \"a379b8abcf93c6be685293df85d1ddaea07823cbb3d9ffa50b09ebb5ba01a8ed\" returns successfully" May 10 00:50:53.111000 audit[5359]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=5359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:53.111000 audit[5359]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc0ca9e7f0 a2=0 a3=7ffc0ca9e7dc items=0 ppid=2761 pid=5359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:53.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:53.116000 audit[5359]: NETFILTER_CFG table=nat:128 family=2 entries=30 op=nft_register_rule pid=5359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:53.116000 audit[5359]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc0ca9e7f0 a2=0 a3=7ffc0ca9e7dc items=0 ppid=2761 pid=5359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:53.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:53.242294 systemd-networkd[1442]: cali53225fbc81c: Gained IPv6LL May 10 00:50:53.360000 audit[5336]: AVC avc: denied { watch } for pid=5336 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_51.1075195940/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c859 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c859 tclass=file permissive=0 May 10 00:50:53.360000 audit[5336]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a7cba0 a2=fc6 a3=0 items=0 ppid=5268 pid=5336 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c859 key=(null) May 10 00:50:53.360000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:50:53.690355 kubelet[2592]: I0510 00:50:53.690300 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="22e6394c-4593-4b80-96ed-9080e295c004" path="/var/lib/kubelet/pods/22e6394c-4593-4b80-96ed-9080e295c004/volumes" May 10 00:50:54.083223 kubelet[2592]: I0510 00:50:54.083187 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:55.451868 env[1711]: time="2025-05-10T00:50:55.451822406Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.460039 env[1711]: time="2025-05-10T00:50:55.459994293Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.466964 env[1711]: time="2025-05-10T00:50:55.466921141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.472730 env[1711]: time="2025-05-10T00:50:55.472681324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:55.472982 env[1711]: time="2025-05-10T00:50:55.472952278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:50:55.485729 env[1711]: time="2025-05-10T00:50:55.485632584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:50:55.557861 env[1711]: time="2025-05-10T00:50:55.557816981Z" level=info msg="CreateContainer within sandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:50:55.583086 env[1711]: time="2025-05-10T00:50:55.583015001Z" level=info msg="CreateContainer within sandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\"" May 10 00:50:55.587010 env[1711]: time="2025-05-10T00:50:55.586963563Z" level=info msg="StartContainer for \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\"" May 10 00:50:55.642142 systemd[1]: Started cri-containerd-1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84.scope. May 10 00:50:55.674760 kernel: kauditd_printk_skb: 253 callbacks suppressed May 10 00:50:55.674962 kernel: audit: type=1400 audit(1746838255.672:1376): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680762 kernel: audit: type=1400 audit(1746838255.672:1377): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.684512 kernel: audit: type=1400 audit(1746838255.672:1378): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.689593 kernel: audit: type=1400 audit(1746838255.672:1379): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.693226 kernel: audit: type=1400 audit(1746838255.672:1380): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.698258 kernel: audit: type=1400 audit(1746838255.672:1381): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.703134 kernel: audit: type=1400 audit(1746838255.672:1382): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.706790 kernel: audit: type=1400 audit(1746838255.672:1383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.710862 kernel: audit: type=1400 audit(1746838255.672:1384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.673000 audit: BPF prog-id=220 op=LOAD May 10 00:50:55.680000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.719181 kernel: audit: type=1400 audit(1746838255.673:1385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5034 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:55.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613933636463316461636564313436376462376536353031343031 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5034 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:55.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613933636463316461636564313436376462376536353031343031 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.680000 audit: BPF prog-id=221 op=LOAD May 10 00:50:55.680000 audit[5368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039a080 items=0 ppid=5034 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:55.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613933636463316461636564313436376462376536353031343031 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit: BPF prog-id=222 op=LOAD May 10 00:50:55.688000 audit[5368]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039a0c8 items=0 ppid=5034 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:55.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613933636463316461636564313436376462376536353031343031 May 10 00:50:55.688000 audit: BPF prog-id=222 op=UNLOAD May 10 00:50:55.688000 audit: BPF prog-id=221 op=UNLOAD May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { perfmon } for pid=5368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit[5368]: AVC avc: denied { bpf } for pid=5368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:55.688000 audit: BPF prog-id=223 op=LOAD May 10 00:50:55.688000 audit[5368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039a4d8 items=0 ppid=5034 pid=5368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:55.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613933636463316461636564313436376462376536353031343031 May 10 00:50:55.737833 env[1711]: time="2025-05-10T00:50:55.737172817Z" level=info msg="StartContainer for \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\" returns successfully" May 10 00:50:55.942480 kubelet[2592]: I0510 00:50:55.942195 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:55.987900 kubelet[2592]: I0510 00:50:55.975742 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7546f75ff6-8b975" podStartSLOduration=4.966437969 podStartE2EDuration="4.966437969s" podCreationTimestamp="2025-05-10 00:50:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:50:53.094321314 +0000 UTC m=+43.668248126" watchObservedRunningTime="2025-05-10 00:50:55.966437969 +0000 UTC m=+46.540364780" May 10 00:50:56.004000 audit[5395]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:56.004000 audit[5395]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe90cb3d40 a2=0 a3=7ffe90cb3d2c items=0 ppid=2761 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:56.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:56.008000 audit[5395]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=5395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:56.008000 audit[5395]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe90cb3d40 a2=0 a3=7ffe90cb3d2c items=0 ppid=2761 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:56.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:56.243134 kubelet[2592]: I0510 00:50:56.242974 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7d4dc549b6-r5rcc" podStartSLOduration=29.33565861 podStartE2EDuration="35.242940932s" podCreationTimestamp="2025-05-10 00:50:21 +0000 UTC" firstStartedPulling="2025-05-10 00:50:49.569339113 +0000 UTC m=+40.143265917" lastFinishedPulling="2025-05-10 00:50:55.47662143 +0000 UTC m=+46.050548239" observedRunningTime="2025-05-10 00:50:56.133416479 +0000 UTC m=+46.707343292" watchObservedRunningTime="2025-05-10 00:50:56.242940932 +0000 UTC m=+46.816867747" May 10 00:50:56.539494 systemd[1]: run-containerd-runc-k8s.io-1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84-runc.nC6ImH.mount: Deactivated successfully. May 10 00:50:57.076274 env[1711]: time="2025-05-10T00:50:57.076213678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:57.078501 env[1711]: time="2025-05-10T00:50:57.078455646Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:57.080355 env[1711]: time="2025-05-10T00:50:57.080316487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:57.085069 env[1711]: time="2025-05-10T00:50:57.085006561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:50:57.085842 env[1711]: time="2025-05-10T00:50:57.085683942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:50:57.109075 env[1711]: time="2025-05-10T00:50:57.109033803Z" level=info msg="CreateContainer within sandbox \"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:50:57.126369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1555200924.mount: Deactivated successfully. May 10 00:50:57.131889 env[1711]: time="2025-05-10T00:50:57.131850728Z" level=info msg="CreateContainer within sandbox \"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"33a9ae6f489493858a194af2f881092414b57a9114f4356e7538adf640828b8d\"" May 10 00:50:57.133106 env[1711]: time="2025-05-10T00:50:57.132986296Z" level=info msg="StartContainer for \"33a9ae6f489493858a194af2f881092414b57a9114f4356e7538adf640828b8d\"" May 10 00:50:57.162112 systemd[1]: Started cri-containerd-33a9ae6f489493858a194af2f881092414b57a9114f4356e7538adf640828b8d.scope. May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f3df7057258 items=0 ppid=4665 pid=5427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613961653666343839343933383538613139346166326638383130 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit: BPF prog-id=224 op=LOAD May 10 00:50:57.179000 audit[5427]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000153b88 items=0 ppid=4665 pid=5427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613961653666343839343933383538613139346166326638383130 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit: BPF prog-id=225 op=LOAD May 10 00:50:57.179000 audit[5427]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000153bd8 items=0 ppid=4665 pid=5427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613961653666343839343933383538613139346166326638383130 May 10 00:50:57.179000 audit: BPF prog-id=225 op=UNLOAD May 10 00:50:57.179000 audit: BPF prog-id=224 op=UNLOAD May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { perfmon } for pid=5427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit[5427]: AVC avc: denied { bpf } for pid=5427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:50:57.179000 audit: BPF prog-id=226 op=LOAD May 10 00:50:57.179000 audit[5427]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000153c68 items=0 ppid=4665 pid=5427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333613961653666343839343933383538613139346166326638383130 May 10 00:50:57.199750 env[1711]: time="2025-05-10T00:50:57.198973536Z" level=info msg="StartContainer for \"33a9ae6f489493858a194af2f881092414b57a9114f4356e7538adf640828b8d\" returns successfully" May 10 00:50:57.539679 systemd[1]: run-containerd-runc-k8s.io-33a9ae6f489493858a194af2f881092414b57a9114f4356e7538adf640828b8d-runc.ad2U6l.mount: Deactivated successfully. May 10 00:50:58.136301 kubelet[2592]: I0510 00:50:58.132998 2592 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:50:58.137864 kubelet[2592]: I0510 00:50:58.137837 2592 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:50:58.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.58:22-139.178.89.65:51724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:58.163641 systemd[1]: Started sshd@7-172.31.28.58:22-139.178.89.65:51724.service. May 10 00:50:58.428000 audit[5462]: USER_ACCT pid=5462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:58.431179 sshd[5462]: Accepted publickey for core from 139.178.89.65 port 51724 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:50:58.430000 audit[5462]: CRED_ACQ pid=5462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:58.430000 audit[5462]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea3e6f2e0 a2=3 a3=0 items=0 ppid=1 pid=5462 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:58.430000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:58.434705 sshd[5462]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:58.446663 systemd[1]: Started session-8.scope. May 10 00:50:58.447687 systemd-logind[1701]: New session 8 of user core. May 10 00:50:58.454000 audit[5462]: USER_START pid=5462 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:58.459000 audit[5464]: CRED_ACQ pid=5464 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:59.385396 sshd[5462]: pam_unix(sshd:session): session closed for user core May 10 00:50:59.386000 audit[5462]: USER_END pid=5462 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:59.386000 audit[5462]: CRED_DISP pid=5462 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:50:59.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.28.58:22-139.178.89.65:51724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:59.388512 systemd[1]: sshd@7-172.31.28.58:22-139.178.89.65:51724.service: Deactivated successfully. May 10 00:50:59.389322 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:50:59.392516 systemd-logind[1701]: Session 8 logged out. Waiting for processes to exit. May 10 00:50:59.394463 systemd-logind[1701]: Removed session 8. May 10 00:51:04.334000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:04.338208 kernel: kauditd_printk_skb: 107 callbacks suppressed May 10 00:51:04.339249 kernel: audit: type=1400 audit(1746838264.334:1411): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:04.334000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:04.352734 kernel: audit: type=1400 audit(1746838264.334:1412): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:04.352880 kernel: audit: type=1300 audit(1746838264.334:1412): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014eb830 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:04.334000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014eb830 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:04.334000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:04.370102 kernel: audit: type=1327 audit(1746838264.334:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:04.372050 kernel: audit: type=1300 audit(1746838264.334:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002037320 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:04.334000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002037320 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:04.334000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:04.389306 kernel: audit: type=1327 audit(1746838264.334:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:04.413069 systemd[1]: Started sshd@8-172.31.28.58:22-139.178.89.65:51730.service. May 10 00:51:04.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.58:22-139.178.89.65:51730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:04.422768 kernel: audit: type=1130 audit(1746838264.412:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.58:22-139.178.89.65:51730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:04.595000 audit[5484]: USER_ACCT pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.597678 sshd[5484]: Accepted publickey for core from 139.178.89.65 port 51730 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:04.604762 kernel: audit: type=1101 audit(1746838264.595:1414): pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.605265 sshd[5484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:04.604000 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.614648 systemd[1]: Started session-9.scope. May 10 00:51:04.616075 kernel: audit: type=1103 audit(1746838264.604:1415): pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.616155 kernel: audit: type=1006 audit(1746838264.604:1416): pid=5484 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:51:04.604000 audit[5484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa633560 a2=3 a3=0 items=0 ppid=1 pid=5484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:04.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:04.616374 systemd-logind[1701]: New session 9 of user core. May 10 00:51:04.621000 audit[5484]: USER_START pid=5484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.623000 audit[5486]: CRED_ACQ pid=5486 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.900825 sshd[5484]: pam_unix(sshd:session): session closed for user core May 10 00:51:04.901000 audit[5484]: USER_END pid=5484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.901000 audit[5484]: CRED_DISP pid=5484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:04.904082 systemd[1]: sshd@8-172.31.28.58:22-139.178.89.65:51730.service: Deactivated successfully. May 10 00:51:04.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.28.58:22-139.178.89.65:51730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:04.904879 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:51:04.905544 systemd-logind[1701]: Session 9 logged out. Waiting for processes to exit. May 10 00:51:04.906467 systemd-logind[1701]: Removed session 9. May 10 00:51:05.345000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:05.345000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:05.345000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c012197a80 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:51:05.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:51:05.345000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010601530 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:51:05.345000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:51:05.376000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:05.376000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010601740 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:51:05.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:51:05.381000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:05.381000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:05.381000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010601830 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:51:05.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:51:05.381000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c012197b60 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:51:05.381000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:51:05.384000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:05.384000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0106018c0 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:51:05.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:51:09.645182 env[1711]: time="2025-05-10T00:51:09.645143070Z" level=info msg="StopPodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\"" May 10 00:51:09.928080 systemd[1]: Started sshd@9-172.31.28.58:22-139.178.89.65:35508.service. May 10 00:51:09.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.58:22-139.178.89.65:35508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:09.931202 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:51:09.931297 kernel: audit: type=1130 audit(1746838269.927:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.58:22-139.178.89.65:35508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.151000 audit[5516]: USER_ACCT pid=5516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.160804 kernel: audit: type=1101 audit(1746838270.151:1429): pid=5516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.161277 sshd[5516]: Accepted publickey for core from 139.178.89.65 port 35508 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:10.160000 audit[5516]: CRED_ACQ pid=5516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.174301 kernel: audit: type=1103 audit(1746838270.160:1430): pid=5516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.174461 kernel: audit: type=1006 audit(1746838270.160:1431): pid=5516 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:51:10.160000 audit[5516]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99fe90e0 a2=3 a3=0 items=0 ppid=1 pid=5516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.175380 sshd[5516]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:10.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:10.188137 kernel: audit: type=1300 audit(1746838270.160:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99fe90e0 a2=3 a3=0 items=0 ppid=1 pid=5516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.188234 kernel: audit: type=1327 audit(1746838270.160:1431): proctitle=737368643A20636F7265205B707269765D May 10 00:51:10.193607 systemd[1]: Started session-10.scope. May 10 00:51:10.194383 systemd-logind[1701]: New session 10 of user core. May 10 00:51:10.204000 audit[5516]: USER_START pid=5516 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.215852 kernel: audit: type=1105 audit(1746838270.204:1432): pid=5516 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.214000 audit[5524]: CRED_ACQ pid=5524 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.225848 kernel: audit: type=1103 audit(1746838270.214:1433): pid=5524 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.048 [WARNING][5510] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c56cf48b-d193-4367-960c-062b280b8403", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0", Pod:"csi-node-driver-22cln", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0761bcf2692", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.050 [INFO][5510] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.051 [INFO][5510] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" iface="eth0" netns="" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.052 [INFO][5510] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.052 [INFO][5510] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.488 [INFO][5520] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.493 [INFO][5520] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.495 [INFO][5520] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.513 [WARNING][5520] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.513 [INFO][5520] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.516 [INFO][5520] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.519751 env[1711]: 2025-05-10 00:51:10.517 [INFO][5510] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.520468 env[1711]: time="2025-05-10T00:51:10.519762185Z" level=info msg="TearDown network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" successfully" May 10 00:51:10.520468 env[1711]: time="2025-05-10T00:51:10.519798516Z" level=info msg="StopPodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" returns successfully" May 10 00:51:10.529492 sshd[5516]: pam_unix(sshd:session): session closed for user core May 10 00:51:10.530437 env[1711]: time="2025-05-10T00:51:10.530392550Z" level=info msg="RemovePodSandbox for \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\"" May 10 00:51:10.530577 env[1711]: time="2025-05-10T00:51:10.530437972Z" level=info msg="Forcibly stopping sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\"" May 10 00:51:10.532000 audit[5516]: USER_END pid=5516 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.535237 systemd[1]: sshd@9-172.31.28.58:22-139.178.89.65:35508.service: Deactivated successfully. May 10 00:51:10.540516 systemd-logind[1701]: Session 10 logged out. Waiting for processes to exit. May 10 00:51:10.543875 kernel: audit: type=1106 audit(1746838270.532:1434): pid=5516 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.543400 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:51:10.532000 audit[5516]: CRED_DISP pid=5516 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.545122 systemd-logind[1701]: Removed session 10. May 10 00:51:10.552789 kernel: audit: type=1104 audit(1746838270.532:1435): pid=5516 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.28.58:22-139.178.89.65:35508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.558576 systemd[1]: Started sshd@10-172.31.28.58:22-139.178.89.65:35512.service. May 10 00:51:10.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.58:22-139.178.89.65:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.612 [WARNING][5551] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c56cf48b-d193-4367-960c-062b280b8403", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5b5cc68cd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"4821eabdd31722785d4243cf44eefe26e5d1b3971cfe52a39a9e55490b087dd0", Pod:"csi-node-driver-22cln", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.101.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0761bcf2692", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.612 [INFO][5551] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.612 [INFO][5551] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" iface="eth0" netns="" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.612 [INFO][5551] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.612 [INFO][5551] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.647 [INFO][5560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.648 [INFO][5560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.648 [INFO][5560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.654 [WARNING][5560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.654 [INFO][5560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" HandleID="k8s-pod-network.d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" Workload="ip--172--31--28--58-k8s-csi--node--driver--22cln-eth0" May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.657 [INFO][5560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.661390 env[1711]: 2025-05-10 00:51:10.659 [INFO][5551] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8" May 10 00:51:10.661390 env[1711]: time="2025-05-10T00:51:10.661375397Z" level=info msg="TearDown network for sandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" successfully" May 10 00:51:10.668098 env[1711]: time="2025-05-10T00:51:10.668050201Z" level=info msg="RemovePodSandbox \"d77448d077f11dcf402290217eafc13b0d278a11e5052639a6c344845fc45ee8\" returns successfully" May 10 00:51:10.673787 env[1711]: time="2025-05-10T00:51:10.673743793Z" level=info msg="StopPodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\"" May 10 00:51:10.752000 audit[5550]: USER_ACCT pid=5550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.754000 audit[5550]: CRED_ACQ pid=5550 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.754000 audit[5550]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea81546f0 a2=3 a3=0 items=0 ppid=1 pid=5550 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:10.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:10.755682 sshd[5550]: Accepted publickey for core from 139.178.89.65 port 35512 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:10.756220 sshd[5550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:10.762995 systemd[1]: Started session-11.scope. May 10 00:51:10.764630 systemd-logind[1701]: New session 11 of user core. May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.721 [WARNING][5579] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0", GenerateName:"calico-kube-controllers-7d4dc549b6-", Namespace:"calico-system", SelfLink:"", UID:"3e389aba-45af-41cb-8bb1-203d68ea6cb3", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4dc549b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b", Pod:"calico-kube-controllers-7d4dc549b6-r5rcc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie9be09c746f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.722 [INFO][5579] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.722 [INFO][5579] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" iface="eth0" netns="" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.722 [INFO][5579] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.722 [INFO][5579] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.747 [INFO][5586] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.747 [INFO][5586] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.747 [INFO][5586] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.754 [WARNING][5586] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.754 [INFO][5586] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.757 [INFO][5586] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.767940 env[1711]: 2025-05-10 00:51:10.763 [INFO][5579] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.767940 env[1711]: time="2025-05-10T00:51:10.767850575Z" level=info msg="TearDown network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" successfully" May 10 00:51:10.767940 env[1711]: time="2025-05-10T00:51:10.767888077Z" level=info msg="StopPodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" returns successfully" May 10 00:51:10.768975 env[1711]: time="2025-05-10T00:51:10.768495563Z" level=info msg="RemovePodSandbox for \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\"" May 10 00:51:10.768975 env[1711]: time="2025-05-10T00:51:10.768533467Z" level=info msg="Forcibly stopping sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\"" May 10 00:51:10.772000 audit[5550]: USER_START pid=5550 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.774000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.816 [WARNING][5607] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0", GenerateName:"calico-kube-controllers-7d4dc549b6-", Namespace:"calico-system", SelfLink:"", UID:"3e389aba-45af-41cb-8bb1-203d68ea6cb3", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4dc549b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b", Pod:"calico-kube-controllers-7d4dc549b6-r5rcc", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie9be09c746f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.817 [INFO][5607] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.817 [INFO][5607] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" iface="eth0" netns="" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.817 [INFO][5607] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.817 [INFO][5607] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.841 [INFO][5614] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.842 [INFO][5614] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.842 [INFO][5614] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.857 [WARNING][5614] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.857 [INFO][5614] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" HandleID="k8s-pod-network.d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.859 [INFO][5614] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:10.863609 env[1711]: 2025-05-10 00:51:10.861 [INFO][5607] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed" May 10 00:51:10.864820 env[1711]: time="2025-05-10T00:51:10.863978515Z" level=info msg="TearDown network for sandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" successfully" May 10 00:51:10.870642 env[1711]: time="2025-05-10T00:51:10.870161600Z" level=info msg="RemovePodSandbox \"d0a3037fcc97cd2dbd26247d742a1b1f06df44c1b0753a4779cc9aad67de3bed\" returns successfully" May 10 00:51:10.871293 env[1711]: time="2025-05-10T00:51:10.871263325Z" level=info msg="StopPodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\"" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.925 [WARNING][5639] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a65a8624-5006-4401-a7ce-37fb7636b1b0", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa", Pod:"coredns-668d6bf9bc-62t5d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a2d5d5b0b3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.928 [INFO][5639] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.928 [INFO][5639] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" iface="eth0" netns="" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.928 [INFO][5639] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.928 [INFO][5639] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.983 [INFO][5646] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.984 [INFO][5646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.984 [INFO][5646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.994 [WARNING][5646] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.994 [INFO][5646] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.996 [INFO][5646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.001895 env[1711]: 2025-05-10 00:51:10.998 [INFO][5639] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.001895 env[1711]: time="2025-05-10T00:51:11.000742332Z" level=info msg="TearDown network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" successfully" May 10 00:51:11.001895 env[1711]: time="2025-05-10T00:51:11.000780180Z" level=info msg="StopPodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" returns successfully" May 10 00:51:11.001895 env[1711]: time="2025-05-10T00:51:11.001462647Z" level=info msg="RemovePodSandbox for \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\"" May 10 00:51:11.001895 env[1711]: time="2025-05-10T00:51:11.001525850Z" level=info msg="Forcibly stopping sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\"" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.071 [WARNING][5667] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a65a8624-5006-4401-a7ce-37fb7636b1b0", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"64f8aa29fe08bac893be1ee48590dd09c4f828a150a35697d8b65cbed189affa", Pod:"coredns-668d6bf9bc-62t5d", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a2d5d5b0b3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.071 [INFO][5667] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.071 [INFO][5667] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" iface="eth0" netns="" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.071 [INFO][5667] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.072 [INFO][5667] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.116 [INFO][5674] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.117 [INFO][5674] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.117 [INFO][5674] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.135 [WARNING][5674] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.135 [INFO][5674] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" HandleID="k8s-pod-network.d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--62t5d-eth0" May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.138 [INFO][5674] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.147928 env[1711]: 2025-05-10 00:51:11.144 [INFO][5667] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd" May 10 00:51:11.147928 env[1711]: time="2025-05-10T00:51:11.145734594Z" level=info msg="TearDown network for sandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" successfully" May 10 00:51:11.157222 env[1711]: time="2025-05-10T00:51:11.157153609Z" level=info msg="RemovePodSandbox \"d3eccddd213e5100bf20f0252c8645e7ba9a7a3008669500275914ac6e17abcd\" returns successfully" May 10 00:51:11.157840 env[1711]: time="2025-05-10T00:51:11.157796340Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" May 10 00:51:11.176407 sshd[5550]: pam_unix(sshd:session): session closed for user core May 10 00:51:11.178000 audit[5550]: USER_END pid=5550 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.178000 audit[5550]: CRED_DISP pid=5550 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.28.58:22-139.178.89.65:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:11.181315 systemd[1]: sshd@10-172.31.28.58:22-139.178.89.65:35512.service: Deactivated successfully. May 10 00:51:11.182751 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:51:11.186359 systemd-logind[1701]: Session 11 logged out. Waiting for processes to exit. May 10 00:51:11.188517 systemd-logind[1701]: Removed session 11. May 10 00:51:11.203592 systemd[1]: Started sshd@11-172.31.28.58:22-139.178.89.65:35516.service. May 10 00:51:11.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.58:22-139.178.89.65:35516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.293 [WARNING][5694] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.293 [INFO][5694] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.293 [INFO][5694] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" iface="eth0" netns="" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.293 [INFO][5694] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.293 [INFO][5694] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.327 [INFO][5705] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.327 [INFO][5705] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.327 [INFO][5705] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.334 [WARNING][5705] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.334 [INFO][5705] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.336 [INFO][5705] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.340566 env[1711]: 2025-05-10 00:51:11.338 [INFO][5694] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.342747 env[1711]: time="2025-05-10T00:51:11.340806796Z" level=info msg="TearDown network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" successfully" May 10 00:51:11.342747 env[1711]: time="2025-05-10T00:51:11.340848338Z" level=info msg="StopPodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" returns successfully" May 10 00:51:11.342747 env[1711]: time="2025-05-10T00:51:11.341355800Z" level=info msg="RemovePodSandbox for \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" May 10 00:51:11.342747 env[1711]: time="2025-05-10T00:51:11.341389947Z" level=info msg="Forcibly stopping sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\"" May 10 00:51:11.409000 audit[5701]: USER_ACCT pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.412663 sshd[5701]: Accepted publickey for core from 139.178.89.65 port 35516 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:11.419000 audit[5701]: CRED_ACQ pid=5701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.419000 audit[5701]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe72665720 a2=3 a3=0 items=0 ppid=1 pid=5701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:11.419000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:11.424824 sshd[5701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:11.432701 systemd[1]: Started session-12.scope. May 10 00:51:11.434034 systemd-logind[1701]: New session 12 of user core. May 10 00:51:11.440000 audit[5701]: USER_START pid=5701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.443000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.398 [WARNING][5723] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.398 [INFO][5723] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.398 [INFO][5723] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" iface="eth0" netns="" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.398 [INFO][5723] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.398 [INFO][5723] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.454 [INFO][5730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.454 [INFO][5730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.455 [INFO][5730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.462 [WARNING][5730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.462 [INFO][5730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" HandleID="k8s-pod-network.0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.464 [INFO][5730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.468014 env[1711]: 2025-05-10 00:51:11.466 [INFO][5723] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23" May 10 00:51:11.469960 env[1711]: time="2025-05-10T00:51:11.468042565Z" level=info msg="TearDown network for sandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" successfully" May 10 00:51:11.474233 env[1711]: time="2025-05-10T00:51:11.474119853Z" level=info msg="RemovePodSandbox \"0d98920f1800635cc7b1a1f106d66f9f17a8e9509489eac4d66584f2e71a5d23\" returns successfully" May 10 00:51:11.474630 env[1711]: time="2025-05-10T00:51:11.474604513Z" level=info msg="StopPodSandbox for \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\"" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.515 [WARNING][5749] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.515 [INFO][5749] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.515 [INFO][5749] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" iface="eth0" netns="" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.515 [INFO][5749] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.516 [INFO][5749] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.570 [INFO][5756] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.573 [INFO][5756] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.573 [INFO][5756] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.585 [WARNING][5756] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.585 [INFO][5756] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.589 [INFO][5756] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.601939 env[1711]: 2025-05-10 00:51:11.598 [INFO][5749] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.602988 env[1711]: time="2025-05-10T00:51:11.602939055Z" level=info msg="TearDown network for sandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" successfully" May 10 00:51:11.603141 env[1711]: time="2025-05-10T00:51:11.603119011Z" level=info msg="StopPodSandbox for \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" returns successfully" May 10 00:51:11.604095 env[1711]: time="2025-05-10T00:51:11.604055555Z" level=info msg="RemovePodSandbox for \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\"" May 10 00:51:11.604372 env[1711]: time="2025-05-10T00:51:11.604300039Z" level=info msg="Forcibly stopping sandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\"" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.683 [WARNING][5782] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.683 [INFO][5782] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.683 [INFO][5782] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" iface="eth0" netns="" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.683 [INFO][5782] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.683 [INFO][5782] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.718 [INFO][5789] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.718 [INFO][5789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.719 [INFO][5789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.731 [WARNING][5789] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.731 [INFO][5789] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" HandleID="k8s-pod-network.55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--7vsv5-eth0" May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.733 [INFO][5789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.738589 env[1711]: 2025-05-10 00:51:11.736 [INFO][5782] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5" May 10 00:51:11.738589 env[1711]: time="2025-05-10T00:51:11.738549816Z" level=info msg="TearDown network for sandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" successfully" May 10 00:51:11.749844 env[1711]: time="2025-05-10T00:51:11.749793220Z" level=info msg="RemovePodSandbox \"55f5360cc1556070715f08ce00f0433b15377c794618c490963f24c80b6a67e5\" returns successfully" May 10 00:51:11.751631 env[1711]: time="2025-05-10T00:51:11.751589279Z" level=info msg="StopPodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\"" May 10 00:51:11.798685 sshd[5701]: pam_unix(sshd:session): session closed for user core May 10 00:51:11.801000 audit[5701]: USER_END pid=5701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.802000 audit[5701]: CRED_DISP pid=5701 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:11.804739 systemd[1]: sshd@11-172.31.28.58:22-139.178.89.65:35516.service: Deactivated successfully. May 10 00:51:11.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.28.58:22-139.178.89.65:35516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:11.805511 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:51:11.806192 systemd-logind[1701]: Session 12 logged out. Waiting for processes to exit. May 10 00:51:11.807577 systemd-logind[1701]: Removed session 12. May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.806 [WARNING][5808] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6e1cccca-0933-4b7c-b858-dd02621e6c78", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1", Pod:"coredns-668d6bf9bc-pbhpv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5cf9a59240", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.806 [INFO][5808] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.806 [INFO][5808] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" iface="eth0" netns="" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.806 [INFO][5808] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.806 [INFO][5808] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.832 [INFO][5817] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.832 [INFO][5817] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.832 [INFO][5817] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.841 [WARNING][5817] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.842 [INFO][5817] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.844 [INFO][5817] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.847828 env[1711]: 2025-05-10 00:51:11.846 [INFO][5808] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.849196 env[1711]: time="2025-05-10T00:51:11.847857683Z" level=info msg="TearDown network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" successfully" May 10 00:51:11.849196 env[1711]: time="2025-05-10T00:51:11.847889879Z" level=info msg="StopPodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" returns successfully" May 10 00:51:11.849196 env[1711]: time="2025-05-10T00:51:11.848754535Z" level=info msg="RemovePodSandbox for \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\"" May 10 00:51:11.849196 env[1711]: time="2025-05-10T00:51:11.848788911Z" level=info msg="Forcibly stopping sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\"" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.889 [WARNING][5835] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"6e1cccca-0933-4b7c-b858-dd02621e6c78", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"752dc121c1e44c398a3f113234bebfc82d04753631e57f817e41c9c7395463f1", Pod:"coredns-668d6bf9bc-pbhpv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.101.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie5cf9a59240", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.890 [INFO][5835] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.890 [INFO][5835] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" iface="eth0" netns="" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.890 [INFO][5835] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.890 [INFO][5835] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.917 [INFO][5842] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.917 [INFO][5842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.917 [INFO][5842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.924 [WARNING][5842] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.924 [INFO][5842] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" HandleID="k8s-pod-network.b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" Workload="ip--172--31--28--58-k8s-coredns--668d6bf9bc--pbhpv-eth0" May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.926 [INFO][5842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:11.930221 env[1711]: 2025-05-10 00:51:11.928 [INFO][5835] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb" May 10 00:51:11.930777 env[1711]: time="2025-05-10T00:51:11.930238452Z" level=info msg="TearDown network for sandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" successfully" May 10 00:51:11.936161 env[1711]: time="2025-05-10T00:51:11.936105039Z" level=info msg="RemovePodSandbox \"b287771115af71b3c373856eabb64eed28643c7f2c8fe41d7fe6a068d140efeb\" returns successfully" May 10 00:51:11.936626 env[1711]: time="2025-05-10T00:51:11.936591612Z" level=info msg="StopPodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\"" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:11.989 [WARNING][5860] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b", Pod:"calico-apiserver-7d74784d74-r928m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali98c7ea9e96b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:11.989 [INFO][5860] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:11.989 [INFO][5860] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" iface="eth0" netns="" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:11.989 [INFO][5860] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:11.989 [INFO][5860] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.030 [INFO][5876] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.030 [INFO][5876] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.030 [INFO][5876] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.037 [WARNING][5876] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.038 [INFO][5876] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.041 [INFO][5876] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.045316 env[1711]: 2025-05-10 00:51:12.043 [INFO][5860] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.047085 env[1711]: time="2025-05-10T00:51:12.045888495Z" level=info msg="TearDown network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" successfully" May 10 00:51:12.047085 env[1711]: time="2025-05-10T00:51:12.045922001Z" level=info msg="StopPodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" returns successfully" May 10 00:51:12.047085 env[1711]: time="2025-05-10T00:51:12.046521419Z" level=info msg="RemovePodSandbox for \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\"" May 10 00:51:12.047085 env[1711]: time="2025-05-10T00:51:12.046559970Z" level=info msg="Forcibly stopping sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\"" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.100 [WARNING][5904] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0", GenerateName:"calico-apiserver-7d74784d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7d74784d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b", Pod:"calico-apiserver-7d74784d74-r928m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali98c7ea9e96b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.100 [INFO][5904] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.100 [INFO][5904] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" iface="eth0" netns="" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.100 [INFO][5904] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.100 [INFO][5904] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.128 [INFO][5915] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.128 [INFO][5915] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.128 [INFO][5915] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.135 [WARNING][5915] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.135 [INFO][5915] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" HandleID="k8s-pod-network.536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.136 [INFO][5915] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.140153 env[1711]: 2025-05-10 00:51:12.138 [INFO][5904] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22" May 10 00:51:12.141261 env[1711]: time="2025-05-10T00:51:12.140682272Z" level=info msg="TearDown network for sandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" successfully" May 10 00:51:12.146630 env[1711]: time="2025-05-10T00:51:12.146584127Z" level=info msg="RemovePodSandbox \"536d5111e353dd6ba14f96c3c702a956ababce463c7b7e86e4f29165c3269f22\" returns successfully" May 10 00:51:12.147283 env[1711]: time="2025-05-10T00:51:12.147238858Z" level=info msg="StopPodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\"" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.205 [WARNING][5934] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0", GenerateName:"calico-apiserver-7546f75ff6-", Namespace:"calico-apiserver", SelfLink:"", UID:"cda7d11e-b129-49dd-a536-d25c8eed1b8c", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546f75ff6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd", Pod:"calico-apiserver-7546f75ff6-xjxxm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8742a52f1f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.205 [INFO][5934] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.205 [INFO][5934] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" iface="eth0" netns="" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.205 [INFO][5934] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.205 [INFO][5934] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.238 [INFO][5941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.238 [INFO][5941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.238 [INFO][5941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.248 [WARNING][5941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.248 [INFO][5941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.250 [INFO][5941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.253907 env[1711]: 2025-05-10 00:51:12.252 [INFO][5934] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.254565 env[1711]: time="2025-05-10T00:51:12.253923892Z" level=info msg="TearDown network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" successfully" May 10 00:51:12.254565 env[1711]: time="2025-05-10T00:51:12.253977140Z" level=info msg="StopPodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" returns successfully" May 10 00:51:12.255002 env[1711]: time="2025-05-10T00:51:12.254968610Z" level=info msg="RemovePodSandbox for \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\"" May 10 00:51:12.255118 env[1711]: time="2025-05-10T00:51:12.255008643Z" level=info msg="Forcibly stopping sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\"" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.311 [WARNING][5961] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0", GenerateName:"calico-apiserver-7546f75ff6-", Namespace:"calico-apiserver", SelfLink:"", UID:"cda7d11e-b129-49dd-a536-d25c8eed1b8c", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 50, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7546f75ff6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"9a578ef5e60a4bd86c794b2edb56945ed1fb9ada19321cf4efa0e9dc9ed754fd", Pod:"calico-apiserver-7546f75ff6-xjxxm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.101.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8742a52f1f1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.311 [INFO][5961] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.311 [INFO][5961] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" iface="eth0" netns="" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.311 [INFO][5961] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.311 [INFO][5961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.349 [INFO][5968] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.349 [INFO][5968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.349 [INFO][5968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.358 [WARNING][5968] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.358 [INFO][5968] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" HandleID="k8s-pod-network.f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" Workload="ip--172--31--28--58-k8s-calico--apiserver--7546f75ff6--xjxxm-eth0" May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.360 [INFO][5968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:12.364939 env[1711]: 2025-05-10 00:51:12.362 [INFO][5961] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0" May 10 00:51:12.367313 env[1711]: time="2025-05-10T00:51:12.367267411Z" level=info msg="TearDown network for sandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" successfully" May 10 00:51:12.373727 env[1711]: time="2025-05-10T00:51:12.373560515Z" level=info msg="RemovePodSandbox \"f040225acaf7451ed7afa3bdbbffa9975cdb48711d66ce473e73e8127a0dfce0\" returns successfully" May 10 00:51:12.539655 kubelet[2592]: I0510 00:51:12.536739 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-22cln" podStartSLOduration=42.183429192 podStartE2EDuration="51.523732852s" podCreationTimestamp="2025-05-10 00:50:21 +0000 UTC" firstStartedPulling="2025-05-10 00:50:47.75235053 +0000 UTC m=+38.326277333" lastFinishedPulling="2025-05-10 00:50:57.092654199 +0000 UTC m=+47.666580993" observedRunningTime="2025-05-10 00:50:58.139914027 +0000 UTC m=+48.713840841" watchObservedRunningTime="2025-05-10 00:51:12.523732852 +0000 UTC m=+63.097659655" May 10 00:51:12.761000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:12.761000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a3a5a0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:12.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:12.761000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:12.761000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a3a5c0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:12.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:12.769000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:12.769000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a3a7a0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:12.769000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:12.769000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:12.769000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a3a7c0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:51:12.769000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:16.823013 systemd[1]: Started sshd@12-172.31.28.58:22-139.178.89.65:45382.service. May 10 00:51:16.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.58:22-139.178.89.65:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:16.826579 kernel: kauditd_printk_skb: 35 callbacks suppressed May 10 00:51:16.826694 kernel: audit: type=1130 audit(1746838276.822:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.58:22-139.178.89.65:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:17.069000 audit[5984]: USER_ACCT pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.080031 kernel: audit: type=1101 audit(1746838277.069:1460): pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.080148 sshd[5984]: Accepted publickey for core from 139.178.89.65 port 45382 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:17.078000 audit[5984]: CRED_ACQ pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.090056 sshd[5984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:17.092148 kernel: audit: type=1103 audit(1746838277.078:1461): pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.093090 kernel: audit: type=1006 audit(1746838277.078:1462): pid=5984 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 10 00:51:17.093785 kernel: audit: type=1300 audit(1746838277.078:1462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8d417990 a2=3 a3=0 items=0 ppid=1 pid=5984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:17.078000 audit[5984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8d417990 a2=3 a3=0 items=0 ppid=1 pid=5984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:17.102849 kernel: audit: type=1327 audit(1746838277.078:1462): proctitle=737368643A20636F7265205B707269765D May 10 00:51:17.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:17.104281 systemd[1]: Started session-13.scope. May 10 00:51:17.104660 systemd-logind[1701]: New session 13 of user core. May 10 00:51:17.107000 audit[5984]: USER_START pid=5984 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.117741 kernel: audit: type=1105 audit(1746838277.107:1463): pid=5984 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.109000 audit[5986]: CRED_ACQ pid=5986 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.126873 kernel: audit: type=1103 audit(1746838277.109:1464): pid=5986 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.498707 sshd[5984]: pam_unix(sshd:session): session closed for user core May 10 00:51:17.498000 audit[5984]: USER_END pid=5984 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.502618 systemd[1]: sshd@12-172.31.28.58:22-139.178.89.65:45382.service: Deactivated successfully. May 10 00:51:17.503435 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:51:17.504673 systemd-logind[1701]: Session 13 logged out. Waiting for processes to exit. May 10 00:51:17.505741 systemd-logind[1701]: Removed session 13. May 10 00:51:17.515526 kernel: audit: type=1106 audit(1746838277.498:1465): pid=5984 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.515652 kernel: audit: type=1104 audit(1746838277.498:1466): pid=5984 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.498000 audit[5984]: CRED_DISP pid=5984 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:17.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.28.58:22-139.178.89.65:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:21.639506 kubelet[2592]: I0510 00:51:21.639437 2592 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:51:21.715421 env[1711]: time="2025-05-10T00:51:21.715223265Z" level=info msg="StopContainer for \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\" with timeout 300 (s)" May 10 00:51:21.716184 env[1711]: time="2025-05-10T00:51:21.716044378Z" level=info msg="Stop container \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\" with signal terminated" May 10 00:51:21.993059 env[1711]: time="2025-05-10T00:51:21.992686614Z" level=info msg="StopContainer for \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\" with timeout 30 (s)" May 10 00:51:21.993652 env[1711]: time="2025-05-10T00:51:21.993502184Z" level=info msg="Stop container \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\" with signal terminated" May 10 00:51:22.077895 systemd[1]: cri-containerd-57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113.scope: Deactivated successfully. May 10 00:51:22.083997 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:51:22.084104 kernel: audit: type=1334 audit(1746838282.077:1468): prog-id=201 op=UNLOAD May 10 00:51:22.077000 audit: BPF prog-id=201 op=UNLOAD May 10 00:51:22.091423 kernel: audit: type=1334 audit(1746838282.084:1469): prog-id=204 op=UNLOAD May 10 00:51:22.084000 audit: BPF prog-id=204 op=UNLOAD May 10 00:51:22.127009 env[1711]: time="2025-05-10T00:51:22.126955816Z" level=info msg="shim disconnected" id=57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113 May 10 00:51:22.128384 env[1711]: time="2025-05-10T00:51:22.127209136Z" level=warning msg="cleaning up after shim disconnected" id=57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113 namespace=k8s.io May 10 00:51:22.128384 env[1711]: time="2025-05-10T00:51:22.127229844Z" level=info msg="cleaning up dead shim" May 10 00:51:22.128333 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113-rootfs.mount: Deactivated successfully. May 10 00:51:22.145534 env[1711]: time="2025-05-10T00:51:22.145483217Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6028 runtime=io.containerd.runc.v2\n" May 10 00:51:22.178151 env[1711]: time="2025-05-10T00:51:22.178111249Z" level=info msg="StopContainer for \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\" returns successfully" May 10 00:51:22.183157 env[1711]: time="2025-05-10T00:51:22.183127525Z" level=info msg="StopPodSandbox for \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\"" May 10 00:51:22.183373 env[1711]: time="2025-05-10T00:51:22.183355560Z" level=info msg="Container to stop \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:22.186326 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b-shm.mount: Deactivated successfully. May 10 00:51:22.205788 systemd[1]: cri-containerd-e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b.scope: Deactivated successfully. May 10 00:51:22.205000 audit: BPF prog-id=173 op=UNLOAD May 10 00:51:22.213884 kernel: audit: type=1334 audit(1746838282.205:1470): prog-id=173 op=UNLOAD May 10 00:51:22.214177 kernel: audit: type=1334 audit(1746838282.210:1471): prog-id=176 op=UNLOAD May 10 00:51:22.210000 audit: BPF prog-id=176 op=UNLOAD May 10 00:51:22.219123 env[1711]: time="2025-05-10T00:51:22.219068270Z" level=info msg="StopContainer for \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\" with timeout 30 (s)" May 10 00:51:22.219945 env[1711]: time="2025-05-10T00:51:22.219414192Z" level=info msg="Stop container \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\" with signal terminated" May 10 00:51:22.242000 audit: BPF prog-id=220 op=UNLOAD May 10 00:51:22.243104 systemd[1]: cri-containerd-1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84.scope: Deactivated successfully. May 10 00:51:22.245766 kernel: audit: type=1334 audit(1746838282.242:1472): prog-id=220 op=UNLOAD May 10 00:51:22.246000 audit: BPF prog-id=223 op=UNLOAD May 10 00:51:22.252797 kernel: audit: type=1334 audit(1746838282.246:1473): prog-id=223 op=UNLOAD May 10 00:51:22.264208 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b-rootfs.mount: Deactivated successfully. May 10 00:51:22.265987 env[1711]: time="2025-05-10T00:51:22.265945265Z" level=info msg="shim disconnected" id=e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b May 10 00:51:22.265987 env[1711]: time="2025-05-10T00:51:22.265985435Z" level=warning msg="cleaning up after shim disconnected" id=e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b namespace=k8s.io May 10 00:51:22.266141 env[1711]: time="2025-05-10T00:51:22.265994487Z" level=info msg="cleaning up dead shim" May 10 00:51:22.282940 env[1711]: time="2025-05-10T00:51:22.282779993Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6073 runtime=io.containerd.runc.v2\n" May 10 00:51:22.290102 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84-rootfs.mount: Deactivated successfully. May 10 00:51:22.309756 env[1711]: time="2025-05-10T00:51:22.309694964Z" level=info msg="shim disconnected" id=1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84 May 10 00:51:22.309756 env[1711]: time="2025-05-10T00:51:22.309756466Z" level=warning msg="cleaning up after shim disconnected" id=1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84 namespace=k8s.io May 10 00:51:22.309756 env[1711]: time="2025-05-10T00:51:22.309764870Z" level=info msg="cleaning up dead shim" May 10 00:51:22.316000 audit[6093]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=6093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:22.316000 audit[6093]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffb7ad7bf0 a2=0 a3=7fffb7ad7bdc items=0 ppid=2761 pid=6093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.335696 kernel: audit: type=1325 audit(1746838282.316:1474): table=filter:131 family=2 entries=8 op=nft_register_rule pid=6093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:22.335941 kernel: audit: type=1300 audit(1746838282.316:1474): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffb7ad7bf0 a2=0 a3=7fffb7ad7bdc items=0 ppid=2761 pid=6093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.336120 env[1711]: time="2025-05-10T00:51:22.336065689Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6095 runtime=io.containerd.runc.v2\n" May 10 00:51:22.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:22.342189 kernel: audit: type=1327 audit(1746838282.316:1474): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:22.346226 env[1711]: time="2025-05-10T00:51:22.346176544Z" level=info msg="StopContainer for \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\" returns successfully" May 10 00:51:22.347400 env[1711]: time="2025-05-10T00:51:22.347375188Z" level=info msg="StopPodSandbox for \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\"" May 10 00:51:22.347000 audit[6093]: NETFILTER_CFG table=nat:132 family=2 entries=30 op=nft_register_rule pid=6093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:22.354826 kernel: audit: type=1325 audit(1746838282.347:1475): table=nat:132 family=2 entries=30 op=nft_register_rule pid=6093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:22.347000 audit[6093]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffb7ad7bf0 a2=0 a3=7fffb7ad7bdc items=0 ppid=2761 pid=6093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:22.355110 env[1711]: time="2025-05-10T00:51:22.349136650Z" level=info msg="Container to stop \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:22.356310 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b-shm.mount: Deactivated successfully. May 10 00:51:22.380780 kubelet[2592]: I0510 00:51:22.380742 2592 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:51:22.385000 audit[6127]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=6127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:22.385000 audit[6127]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca6b41950 a2=0 a3=7ffca6b4193c items=0 ppid=2761 pid=6127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:22.391000 audit[6127]: NETFILTER_CFG table=nat:134 family=2 entries=38 op=nft_register_chain pid=6127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:22.391000 audit[6127]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffca6b41950 a2=0 a3=7ffca6b4193c items=0 ppid=2761 pid=6127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:22.414000 audit: BPF prog-id=205 op=UNLOAD May 10 00:51:22.414796 systemd[1]: cri-containerd-d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b.scope: Deactivated successfully. May 10 00:51:22.418000 audit: BPF prog-id=208 op=UNLOAD May 10 00:51:22.458873 env[1711]: time="2025-05-10T00:51:22.458811186Z" level=info msg="shim disconnected" id=d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b May 10 00:51:22.459092 env[1711]: time="2025-05-10T00:51:22.459070835Z" level=warning msg="cleaning up after shim disconnected" id=d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b namespace=k8s.io May 10 00:51:22.459172 env[1711]: time="2025-05-10T00:51:22.459159191Z" level=info msg="cleaning up dead shim" May 10 00:51:22.490737 env[1711]: time="2025-05-10T00:51:22.490678707Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6147 runtime=io.containerd.runc.v2\n" May 10 00:51:22.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.58:22-139.178.89.65:45398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:22.528854 systemd[1]: Started sshd@13-172.31.28.58:22-139.178.89.65:45398.service. May 10 00:51:22.561866 systemd-networkd[1442]: cali98c7ea9e96b: Link DOWN May 10 00:51:22.561876 systemd-networkd[1442]: cali98c7ea9e96b: Lost carrier May 10 00:51:22.685333 systemd-networkd[1442]: calie9be09c746f: Link DOWN May 10 00:51:22.685343 systemd-networkd[1442]: calie9be09c746f: Lost carrier May 10 00:51:22.733000 audit[6205]: NETFILTER_CFG table=filter:135 family=2 entries=44 op=nft_register_rule pid=6205 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:22.733000 audit[6205]: SYSCALL arch=c000003e syscall=46 success=yes exit=6552 a0=3 a1=7ffee046b1d0 a2=0 a3=7ffee046b1bc items=0 ppid=3947 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.733000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:22.734000 audit[6205]: NETFILTER_CFG table=filter:136 family=2 entries=2 op=nft_unregister_chain pid=6205 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:22.734000 audit[6205]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffee046b1d0 a2=0 a3=55b1a7239000 items=0 ppid=3947 pid=6205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.548 [INFO][6121] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.549 [INFO][6121] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" iface="eth0" netns="/var/run/netns/cni-65bc645e-1a00-b453-76a6-5cdc3fe1d521" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.549 [INFO][6121] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" iface="eth0" netns="/var/run/netns/cni-65bc645e-1a00-b453-76a6-5cdc3fe1d521" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.564 [INFO][6121] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" after=15.381454ms iface="eth0" netns="/var/run/netns/cni-65bc645e-1a00-b453-76a6-5cdc3fe1d521" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.564 [INFO][6121] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.564 [INFO][6121] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.673 [INFO][6186] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.674 [INFO][6186] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.674 [INFO][6186] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.764 [INFO][6186] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.764 [INFO][6186] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.767 [INFO][6186] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:22.773226 env[1711]: 2025-05-10 00:51:22.770 [INFO][6121] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:51:22.776558 env[1711]: time="2025-05-10T00:51:22.776156987Z" level=info msg="TearDown network for sandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" successfully" May 10 00:51:22.777410 env[1711]: time="2025-05-10T00:51:22.777367015Z" level=info msg="StopPodSandbox for \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" returns successfully" May 10 00:51:22.837000 audit[6163]: USER_ACCT pid=6163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:22.840728 sshd[6163]: Accepted publickey for core from 139.178.89.65 port 45398 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:22.841000 audit[6163]: CRED_ACQ pid=6163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:22.841000 audit[6163]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcaa648df0 a2=3 a3=0 items=0 ppid=1 pid=6163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:22.847631 sshd[6163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:22.858940 systemd-logind[1701]: New session 14 of user core. May 10 00:51:22.859919 systemd[1]: Started session-14.scope. May 10 00:51:22.869000 audit[6163]: USER_START pid=6163 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:22.871000 audit[6218]: CRED_ACQ pid=6218 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.680 [INFO][6179] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.680 [INFO][6179] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" iface="eth0" netns="/var/run/netns/cni-6a4c7c68-c961-aa5a-b60e-8438acbccca0" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.680 [INFO][6179] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" iface="eth0" netns="/var/run/netns/cni-6a4c7c68-c961-aa5a-b60e-8438acbccca0" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.694 [INFO][6179] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" after=13.338272ms iface="eth0" netns="/var/run/netns/cni-6a4c7c68-c961-aa5a-b60e-8438acbccca0" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.694 [INFO][6179] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.694 [INFO][6179] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.799 [INFO][6201] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.799 [INFO][6201] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.799 [INFO][6201] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.866 [INFO][6201] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.866 [INFO][6201] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.872 [INFO][6201] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:22.877301 env[1711]: 2025-05-10 00:51:22.875 [INFO][6179] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:51:22.878866 env[1711]: time="2025-05-10T00:51:22.877910572Z" level=info msg="TearDown network for sandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" successfully" May 10 00:51:22.878866 env[1711]: time="2025-05-10T00:51:22.877952988Z" level=info msg="StopPodSandbox for \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" returns successfully" May 10 00:51:22.902000 audit[6219]: NETFILTER_CFG table=filter:137 family=2 entries=46 op=nft_register_rule pid=6219 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:22.902000 audit[6219]: SYSCALL arch=c000003e syscall=46 success=yes exit=6824 a0=3 a1=7fff358057c0 a2=0 a3=7fff358057ac items=0 ppid=3947 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.902000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:22.910000 audit[6219]: NETFILTER_CFG table=filter:138 family=2 entries=6 op=nft_unregister_chain pid=6219 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:22.910000 audit[6219]: SYSCALL arch=c000003e syscall=46 success=yes exit=848 a0=3 a1=7fff358057c0 a2=0 a3=556c7c98b000 items=0 ppid=3947 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:22.910000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:23.004521 kubelet[2592]: I0510 00:51:23.004416 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-calico-apiserver-certs\") pod \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\" (UID: \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\") " May 10 00:51:23.004521 kubelet[2592]: I0510 00:51:23.004488 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kdwrt\" (UniqueName: \"kubernetes.io/projected/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-kube-api-access-kdwrt\") pod \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\" (UID: \"7cb46bd7-f6f0-4f40-bba9-9a82d00084f3\") " May 10 00:51:23.101109 kubelet[2592]: I0510 00:51:23.100982 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-kube-api-access-kdwrt" (OuterVolumeSpecName: "kube-api-access-kdwrt") pod "7cb46bd7-f6f0-4f40-bba9-9a82d00084f3" (UID: "7cb46bd7-f6f0-4f40-bba9-9a82d00084f3"). InnerVolumeSpecName "kube-api-access-kdwrt". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 10 00:51:23.105895 kubelet[2592]: I0510 00:51:23.104838 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-dmqx9\" (UniqueName: \"kubernetes.io/projected/3e389aba-45af-41cb-8bb1-203d68ea6cb3-kube-api-access-dmqx9\") pod \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\" (UID: \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\") " May 10 00:51:23.105895 kubelet[2592]: I0510 00:51:23.104893 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e389aba-45af-41cb-8bb1-203d68ea6cb3-tigera-ca-bundle\") pod \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\" (UID: \"3e389aba-45af-41cb-8bb1-203d68ea6cb3\") " May 10 00:51:23.105895 kubelet[2592]: I0510 00:51:23.104975 2592 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-kdwrt\" (UniqueName: \"kubernetes.io/projected/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-kube-api-access-kdwrt\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:23.105895 kubelet[2592]: I0510 00:51:23.105064 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "7cb46bd7-f6f0-4f40-bba9-9a82d00084f3" (UID: "7cb46bd7-f6f0-4f40-bba9-9a82d00084f3"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 10 00:51:23.112125 kubelet[2592]: I0510 00:51:23.112072 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/3e389aba-45af-41cb-8bb1-203d68ea6cb3-kube-api-access-dmqx9" (OuterVolumeSpecName: "kube-api-access-dmqx9") pod "3e389aba-45af-41cb-8bb1-203d68ea6cb3" (UID: "3e389aba-45af-41cb-8bb1-203d68ea6cb3"). InnerVolumeSpecName "kube-api-access-dmqx9". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 10 00:51:23.125686 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b-rootfs.mount: Deactivated successfully. May 10 00:51:23.125837 systemd[1]: run-netns-cni\x2d6a4c7c68\x2dc961\x2daa5a\x2db60e\x2d8438acbccca0.mount: Deactivated successfully. May 10 00:51:23.125923 systemd[1]: run-netns-cni\x2d65bc645e\x2d1a00\x2db453\x2d76a6\x2d5cdc3fe1d521.mount: Deactivated successfully. May 10 00:51:23.126006 systemd[1]: var-lib-kubelet-pods-3e389aba\x2d45af\x2d41cb\x2d8bb1\x2d203d68ea6cb3-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2ddmqx9.mount: Deactivated successfully. May 10 00:51:23.126090 systemd[1]: var-lib-kubelet-pods-7cb46bd7\x2df6f0\x2d4f40\x2dbba9\x2d9a82d00084f3-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkdwrt.mount: Deactivated successfully. May 10 00:51:23.126182 systemd[1]: var-lib-kubelet-pods-7cb46bd7\x2df6f0\x2d4f40\x2dbba9\x2d9a82d00084f3-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:51:23.137968 systemd[1]: var-lib-kubelet-pods-3e389aba\x2d45af\x2d41cb\x2d8bb1\x2d203d68ea6cb3-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 10 00:51:23.142113 kubelet[2592]: I0510 00:51:23.142070 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/3e389aba-45af-41cb-8bb1-203d68ea6cb3-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "3e389aba-45af-41cb-8bb1-203d68ea6cb3" (UID: "3e389aba-45af-41cb-8bb1-203d68ea6cb3"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 10 00:51:23.206021 kubelet[2592]: I0510 00:51:23.205983 2592 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-dmqx9\" (UniqueName: \"kubernetes.io/projected/3e389aba-45af-41cb-8bb1-203d68ea6cb3-kube-api-access-dmqx9\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:23.206250 kubelet[2592]: I0510 00:51:23.206235 2592 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3e389aba-45af-41cb-8bb1-203d68ea6cb3-tigera-ca-bundle\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:23.206342 kubelet[2592]: I0510 00:51:23.206330 2592 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3-calico-apiserver-certs\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:23.354914 sshd[6163]: pam_unix(sshd:session): session closed for user core May 10 00:51:23.357000 audit[6163]: USER_END pid=6163 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.357000 audit[6163]: CRED_DISP pid=6163 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:23.362747 systemd[1]: sshd@13-172.31.28.58:22-139.178.89.65:45398.service: Deactivated successfully. May 10 00:51:23.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.28.58:22-139.178.89.65:45398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:23.363900 systemd-logind[1701]: Session 14 logged out. Waiting for processes to exit. May 10 00:51:23.364537 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:51:23.365772 systemd-logind[1701]: Removed session 14. May 10 00:51:23.379487 kubelet[2592]: I0510 00:51:23.379458 2592 scope.go:117] "RemoveContainer" containerID="1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84" May 10 00:51:23.385049 systemd[1]: Removed slice kubepods-besteffort-pod3e389aba_45af_41cb_8bb1_203d68ea6cb3.slice. May 10 00:51:23.391523 systemd[1]: Removed slice kubepods-besteffort-pod7cb46bd7_f6f0_4f40_bba9_9a82d00084f3.slice. May 10 00:51:23.393762 env[1711]: time="2025-05-10T00:51:23.393341758Z" level=info msg="RemoveContainer for \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\"" May 10 00:51:23.403185 env[1711]: time="2025-05-10T00:51:23.403114658Z" level=info msg="RemoveContainer for \"1ca93cdc1daced1467db7e6501401a6adadc7beeb0cf4e431412fe84dc02ac84\" returns successfully" May 10 00:51:23.417000 audit[6233]: NETFILTER_CFG table=filter:139 family=2 entries=8 op=nft_register_rule pid=6233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:23.417000 audit[6233]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc26d752e0 a2=0 a3=7ffc26d752cc items=0 ppid=2761 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:23.423000 audit[6233]: NETFILTER_CFG table=nat:140 family=2 entries=36 op=nft_register_rule pid=6233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:23.423000 audit[6233]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc26d752e0 a2=0 a3=7ffc26d752cc items=0 ppid=2761 pid=6233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:23.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:23.460157 kubelet[2592]: I0510 00:51:23.460100 2592 memory_manager.go:355] "RemoveStaleState removing state" podUID="7cb46bd7-f6f0-4f40-bba9-9a82d00084f3" containerName="calico-apiserver" May 10 00:51:23.460157 kubelet[2592]: I0510 00:51:23.460152 2592 memory_manager.go:355] "RemoveStaleState removing state" podUID="3e389aba-45af-41cb-8bb1-203d68ea6cb3" containerName="calico-kube-controllers" May 10 00:51:23.460157 kubelet[2592]: I0510 00:51:23.460162 2592 memory_manager.go:355] "RemoveStaleState removing state" podUID="22e6394c-4593-4b80-96ed-9080e295c004" containerName="calico-apiserver" May 10 00:51:23.480001 systemd[1]: Created slice kubepods-besteffort-pod0500545f_9317_4526_b4b8_03db547624cf.slice. May 10 00:51:23.610074 kubelet[2592]: I0510 00:51:23.609930 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w6cx7\" (UniqueName: \"kubernetes.io/projected/0500545f-9317-4526-b4b8-03db547624cf-kube-api-access-w6cx7\") pod \"calico-kube-controllers-78f76f48c6-fsm88\" (UID: \"0500545f-9317-4526-b4b8-03db547624cf\") " pod="calico-system/calico-kube-controllers-78f76f48c6-fsm88" May 10 00:51:23.610074 kubelet[2592]: I0510 00:51:23.609980 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0500545f-9317-4526-b4b8-03db547624cf-tigera-ca-bundle\") pod \"calico-kube-controllers-78f76f48c6-fsm88\" (UID: \"0500545f-9317-4526-b4b8-03db547624cf\") " pod="calico-system/calico-kube-controllers-78f76f48c6-fsm88" May 10 00:51:23.681960 kubelet[2592]: I0510 00:51:23.681903 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="3e389aba-45af-41cb-8bb1-203d68ea6cb3" path="/var/lib/kubelet/pods/3e389aba-45af-41cb-8bb1-203d68ea6cb3/volumes" May 10 00:51:23.684324 kubelet[2592]: I0510 00:51:23.684289 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="7cb46bd7-f6f0-4f40-bba9-9a82d00084f3" path="/var/lib/kubelet/pods/7cb46bd7-f6f0-4f40-bba9-9a82d00084f3/volumes" May 10 00:51:23.787574 env[1711]: time="2025-05-10T00:51:23.787516523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f76f48c6-fsm88,Uid:0500545f-9317-4526-b4b8-03db547624cf,Namespace:calico-system,Attempt:0,}" May 10 00:51:23.934236 (udev-worker)[6185]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:23.938241 systemd-networkd[1442]: cali8236a506c15: Link UP May 10 00:51:23.940069 systemd-networkd[1442]: cali8236a506c15: Gained carrier May 10 00:51:23.940757 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8236a506c15: link becomes ready May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.845 [INFO][6245] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0 calico-kube-controllers-78f76f48c6- calico-system 0500545f-9317-4526-b4b8-03db547624cf 1198 0 2025-05-10 00:51:23 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:78f76f48c6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-28-58 calico-kube-controllers-78f76f48c6-fsm88 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali8236a506c15 [] []}} ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.847 [INFO][6245] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.878 [INFO][6253] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" HandleID="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.888 [INFO][6253] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" HandleID="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310b10), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-28-58", "pod":"calico-kube-controllers-78f76f48c6-fsm88", "timestamp":"2025-05-10 00:51:23.878543595 +0000 UTC"}, Hostname:"ip-172-31-28-58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.888 [INFO][6253] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.888 [INFO][6253] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.888 [INFO][6253] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-28-58' May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.890 [INFO][6253] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.895 [INFO][6253] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.902 [INFO][6253] ipam/ipam.go 489: Trying affinity for 192.168.101.192/26 host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.905 [INFO][6253] ipam/ipam.go 155: Attempting to load block cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.908 [INFO][6253] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.101.192/26 host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.908 [INFO][6253] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.101.192/26 handle="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.910 [INFO][6253] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6 May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.917 [INFO][6253] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.101.192/26 handle="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.928 [INFO][6253] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.101.201/26] block=192.168.101.192/26 handle="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.928 [INFO][6253] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.101.201/26] handle="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" host="ip-172-31-28-58" May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.928 [INFO][6253] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:51:23.972232 env[1711]: 2025-05-10 00:51:23.928 [INFO][6253] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.101.201/26] IPv6=[] ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" HandleID="k8s-pod-network.16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.972951 env[1711]: 2025-05-10 00:51:23.930 [INFO][6245] cni-plugin/k8s.go 386: Populated endpoint ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0", GenerateName:"calico-kube-controllers-78f76f48c6-", Namespace:"calico-system", SelfLink:"", UID:"0500545f-9317-4526-b4b8-03db547624cf", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f76f48c6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"", Pod:"calico-kube-controllers-78f76f48c6-fsm88", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8236a506c15", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:23.972951 env[1711]: 2025-05-10 00:51:23.930 [INFO][6245] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.101.201/32] ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.972951 env[1711]: 2025-05-10 00:51:23.930 [INFO][6245] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8236a506c15 ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.972951 env[1711]: 2025-05-10 00:51:23.942 [INFO][6245] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.972951 env[1711]: 2025-05-10 00:51:23.943 [INFO][6245] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0", GenerateName:"calico-kube-controllers-78f76f48c6-", Namespace:"calico-system", SelfLink:"", UID:"0500545f-9317-4526-b4b8-03db547624cf", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 51, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"78f76f48c6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-28-58", ContainerID:"16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6", Pod:"calico-kube-controllers-78f76f48c6-fsm88", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.101.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8236a506c15", MAC:"3e:f7:a8:7a:6d:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:51:23.972951 env[1711]: 2025-05-10 00:51:23.964 [INFO][6245] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6" Namespace="calico-system" Pod="calico-kube-controllers-78f76f48c6-fsm88" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--78f76f48c6--fsm88-eth0" May 10 00:51:23.998530 env[1711]: time="2025-05-10T00:51:23.998470240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:23.998729 env[1711]: time="2025-05-10T00:51:23.998693954Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:23.998809 env[1711]: time="2025-05-10T00:51:23.998792043Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:23.998995 env[1711]: time="2025-05-10T00:51:23.998973634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6 pid=6280 runtime=io.containerd.runc.v2 May 10 00:51:24.022623 systemd[1]: Started cri-containerd-16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6.scope. May 10 00:51:24.039000 audit[6300]: NETFILTER_CFG table=filter:141 family=2 entries=52 op=nft_register_chain pid=6300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:51:24.039000 audit[6300]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffe720da7f0 a2=0 a3=7ffe720da7dc items=0 ppid=3947 pid=6300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:51:24.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.049000 audit: BPF prog-id=227 op=LOAD May 10 00:51:24.050000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.050000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=6280 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633139353933383135613364333530613262646662326437313762 May 10 00:51:24.050000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.050000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=6280 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633139353933383135613364333530613262646662326437313762 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit: BPF prog-id=228 op=LOAD May 10 00:51:24.051000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000381d90 items=0 ppid=6280 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633139353933383135613364333530613262646662326437313762 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit: BPF prog-id=229 op=LOAD May 10 00:51:24.051000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000381dd8 items=0 ppid=6280 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633139353933383135613364333530613262646662326437313762 May 10 00:51:24.051000 audit: BPF prog-id=229 op=UNLOAD May 10 00:51:24.051000 audit: BPF prog-id=228 op=UNLOAD May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { perfmon } for pid=6291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit[6291]: AVC avc: denied { bpf } for pid=6291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.051000 audit: BPF prog-id=230 op=LOAD May 10 00:51:24.051000 audit[6291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f81e8 items=0 ppid=6280 pid=6291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136633139353933383135613364333530613262646662326437313762 May 10 00:51:24.091860 env[1711]: time="2025-05-10T00:51:24.090948910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-78f76f48c6-fsm88,Uid:0500545f-9317-4526-b4b8-03db547624cf,Namespace:calico-system,Attempt:0,} returns sandbox id \"16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6\"" May 10 00:51:24.132154 env[1711]: time="2025-05-10T00:51:24.132103792Z" level=info msg="CreateContainer within sandbox \"16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:51:24.153825 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1269338864.mount: Deactivated successfully. May 10 00:51:24.163902 env[1711]: time="2025-05-10T00:51:24.163841704Z" level=info msg="CreateContainer within sandbox \"16c19593815a3d350a2bdfb2d717b91249286f8b3ce18566aadbd3191e9b58a6\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a\"" May 10 00:51:24.164970 env[1711]: time="2025-05-10T00:51:24.164934029Z" level=info msg="StartContainer for \"d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a\"" May 10 00:51:24.193655 systemd[1]: Started cri-containerd-d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a.scope. May 10 00:51:24.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit: BPF prog-id=231 op=LOAD May 10 00:51:24.217000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=6280 pid=6321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438326635303039306436363863653966393564366135333966663131 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=6280 pid=6321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438326635303039306436363863653966393564366135333966663131 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.217000 audit: BPF prog-id=232 op=LOAD May 10 00:51:24.217000 audit[6321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000025a50 items=0 ppid=6280 pid=6321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438326635303039306436363863653966393564366135333966663131 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit: BPF prog-id=233 op=LOAD May 10 00:51:24.218000 audit[6321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c000025a98 items=0 ppid=6280 pid=6321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438326635303039306436363863653966393564366135333966663131 May 10 00:51:24.218000 audit: BPF prog-id=233 op=UNLOAD May 10 00:51:24.218000 audit: BPF prog-id=232 op=UNLOAD May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { perfmon } for pid=6321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit[6321]: AVC avc: denied { bpf } for pid=6321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:24.218000 audit: BPF prog-id=234 op=LOAD May 10 00:51:24.218000 audit[6321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c000025ea8 items=0 ppid=6280 pid=6321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438326635303039306436363863653966393564366135333966663131 May 10 00:51:24.257481 env[1711]: time="2025-05-10T00:51:24.257425244Z" level=info msg="StartContainer for \"d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a\" returns successfully" May 10 00:51:24.976000 audit[6390]: NETFILTER_CFG table=filter:142 family=2 entries=8 op=nft_register_rule pid=6390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:24.976000 audit[6390]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd22aa1100 a2=0 a3=7ffd22aa10ec items=0 ppid=2761 pid=6390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:24.981000 audit[6390]: NETFILTER_CFG table=nat:143 family=2 entries=32 op=nft_register_chain pid=6390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:24.981000 audit[6390]: SYSCALL arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7ffd22aa1100 a2=0 a3=7ffd22aa10ec items=0 ppid=2761 pid=6390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:24.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:25.306854 systemd-networkd[1442]: cali8236a506c15: Gained IPv6LL May 10 00:51:25.441002 systemd[1]: run-containerd-runc-k8s.io-d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a-runc.l4cHHP.mount: Deactivated successfully. May 10 00:51:25.529101 kubelet[2592]: I0510 00:51:25.529040 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-78f76f48c6-fsm88" podStartSLOduration=2.526892145 podStartE2EDuration="2.526892145s" podCreationTimestamp="2025-05-10 00:51:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:24.408090009 +0000 UTC m=+74.982016822" watchObservedRunningTime="2025-05-10 00:51:25.526892145 +0000 UTC m=+76.100818976" May 10 00:51:26.257000 audit: BPF prog-id=129 op=UNLOAD May 10 00:51:26.258992 systemd[1]: cri-containerd-43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936.scope: Deactivated successfully. May 10 00:51:26.267000 audit: BPF prog-id=132 op=UNLOAD May 10 00:51:26.286457 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936-rootfs.mount: Deactivated successfully. May 10 00:51:26.288022 env[1711]: time="2025-05-10T00:51:26.287970603Z" level=info msg="shim disconnected" id=43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936 May 10 00:51:26.288022 env[1711]: time="2025-05-10T00:51:26.288020035Z" level=warning msg="cleaning up after shim disconnected" id=43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936 namespace=k8s.io May 10 00:51:26.288376 env[1711]: time="2025-05-10T00:51:26.288030111Z" level=info msg="cleaning up dead shim" May 10 00:51:26.300058 env[1711]: time="2025-05-10T00:51:26.300005411Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6442 runtime=io.containerd.runc.v2\n" May 10 00:51:26.332585 env[1711]: time="2025-05-10T00:51:26.332532443Z" level=info msg="StopContainer for \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\" returns successfully" May 10 00:51:26.333649 env[1711]: time="2025-05-10T00:51:26.333611850Z" level=info msg="StopPodSandbox for \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\"" May 10 00:51:26.333783 env[1711]: time="2025-05-10T00:51:26.333679509Z" level=info msg="Container to stop \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:26.336569 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb-shm.mount: Deactivated successfully. May 10 00:51:26.345150 systemd[1]: cri-containerd-9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb.scope: Deactivated successfully. May 10 00:51:26.343000 audit: BPF prog-id=121 op=UNLOAD May 10 00:51:26.347000 audit: BPF prog-id=124 op=UNLOAD May 10 00:51:26.372100 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb-rootfs.mount: Deactivated successfully. May 10 00:51:26.374140 env[1711]: time="2025-05-10T00:51:26.374098005Z" level=info msg="shim disconnected" id=9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb May 10 00:51:26.374276 env[1711]: time="2025-05-10T00:51:26.374143791Z" level=warning msg="cleaning up after shim disconnected" id=9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb namespace=k8s.io May 10 00:51:26.374276 env[1711]: time="2025-05-10T00:51:26.374154439Z" level=info msg="cleaning up dead shim" May 10 00:51:26.385278 env[1711]: time="2025-05-10T00:51:26.385229472Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6472 runtime=io.containerd.runc.v2\n" May 10 00:51:26.404652 env[1711]: time="2025-05-10T00:51:26.404609392Z" level=info msg="TearDown network for sandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" successfully" May 10 00:51:26.404652 env[1711]: time="2025-05-10T00:51:26.404639232Z" level=info msg="StopPodSandbox for \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" returns successfully" May 10 00:51:26.431855 kubelet[2592]: I0510 00:51:26.431818 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/676e568b-2bf3-47eb-a65d-861041d33df3-tigera-ca-bundle\") pod \"676e568b-2bf3-47eb-a65d-861041d33df3\" (UID: \"676e568b-2bf3-47eb-a65d-861041d33df3\") " May 10 00:51:26.432121 kubelet[2592]: I0510 00:51:26.431864 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-7z2qc\" (UniqueName: \"kubernetes.io/projected/676e568b-2bf3-47eb-a65d-861041d33df3-kube-api-access-7z2qc\") pod \"676e568b-2bf3-47eb-a65d-861041d33df3\" (UID: \"676e568b-2bf3-47eb-a65d-861041d33df3\") " May 10 00:51:26.432121 kubelet[2592]: I0510 00:51:26.431902 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/676e568b-2bf3-47eb-a65d-861041d33df3-typha-certs\") pod \"676e568b-2bf3-47eb-a65d-861041d33df3\" (UID: \"676e568b-2bf3-47eb-a65d-861041d33df3\") " May 10 00:51:26.435000 audit[6489]: NETFILTER_CFG table=filter:144 family=2 entries=8 op=nft_register_rule pid=6489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:26.435000 audit[6489]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe4373f2a0 a2=0 a3=7ffe4373f28c items=0 ppid=2761 pid=6489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:26.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:26.441000 audit[6489]: NETFILTER_CFG table=nat:145 family=2 entries=30 op=nft_register_rule pid=6489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:26.441000 audit[6489]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe4373f2a0 a2=0 a3=7ffe4373f28c items=0 ppid=2761 pid=6489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:26.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:26.449650 systemd[1]: var-lib-kubelet-pods-676e568b\x2d2bf3\x2d47eb\x2da65d\x2d861041d33df3-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d7z2qc.mount: Deactivated successfully. May 10 00:51:26.452632 systemd[1]: var-lib-kubelet-pods-676e568b\x2d2bf3\x2d47eb\x2da65d\x2d861041d33df3-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 10 00:51:26.452741 systemd[1]: var-lib-kubelet-pods-676e568b\x2d2bf3\x2d47eb\x2da65d\x2d861041d33df3-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 10 00:51:26.456310 kubelet[2592]: I0510 00:51:26.456248 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/676e568b-2bf3-47eb-a65d-861041d33df3-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "676e568b-2bf3-47eb-a65d-861041d33df3" (UID: "676e568b-2bf3-47eb-a65d-861041d33df3"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 10 00:51:26.456469 kubelet[2592]: I0510 00:51:26.456339 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/676e568b-2bf3-47eb-a65d-861041d33df3-kube-api-access-7z2qc" (OuterVolumeSpecName: "kube-api-access-7z2qc") pod "676e568b-2bf3-47eb-a65d-861041d33df3" (UID: "676e568b-2bf3-47eb-a65d-861041d33df3"). InnerVolumeSpecName "kube-api-access-7z2qc". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 10 00:51:26.458994 kubelet[2592]: I0510 00:51:26.458944 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/676e568b-2bf3-47eb-a65d-861041d33df3-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "676e568b-2bf3-47eb-a65d-861041d33df3" (UID: "676e568b-2bf3-47eb-a65d-861041d33df3"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 10 00:51:26.532660 kubelet[2592]: I0510 00:51:26.532512 2592 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-7z2qc\" (UniqueName: \"kubernetes.io/projected/676e568b-2bf3-47eb-a65d-861041d33df3-kube-api-access-7z2qc\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:26.532660 kubelet[2592]: I0510 00:51:26.532555 2592 reconciler_common.go:299] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/676e568b-2bf3-47eb-a65d-861041d33df3-typha-certs\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:26.532660 kubelet[2592]: I0510 00:51:26.532565 2592 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/676e568b-2bf3-47eb-a65d-861041d33df3-tigera-ca-bundle\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:27.410541 kubelet[2592]: I0510 00:51:27.410477 2592 scope.go:117] "RemoveContainer" containerID="43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936" May 10 00:51:27.414484 systemd[1]: Removed slice kubepods-besteffort-pod676e568b_2bf3_47eb_a65d_861041d33df3.slice. May 10 00:51:27.420637 env[1711]: time="2025-05-10T00:51:27.420254653Z" level=info msg="RemoveContainer for \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\"" May 10 00:51:27.426117 env[1711]: time="2025-05-10T00:51:27.426077080Z" level=info msg="RemoveContainer for \"43bb18838c81685d2f8d37b3a912ba52103a73c53a37831195779848fd75a936\" returns successfully" May 10 00:51:27.679844 kubelet[2592]: I0510 00:51:27.679740 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="676e568b-2bf3-47eb-a65d-861041d33df3" path="/var/lib/kubelet/pods/676e568b-2bf3-47eb-a65d-861041d33df3/volumes" May 10 00:51:27.760000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.762821 kernel: kauditd_printk_skb: 172 callbacks suppressed May 10 00:51:27.762926 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.769505 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.776798 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.776883 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.784355 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.784453 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.787822 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.791141 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.794418 kernel: audit: type=1400 audit(1746838287.760:1540): avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.760000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.796399 kernel: audit: type=1334 audit(1746838287.760:1540): prog-id=235 op=LOAD May 10 00:51:27.760000 audit: BPF prog-id=235 op=LOAD May 10 00:51:27.760000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b4b90e0 a2=98 a3=3 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.760000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.768000 audit: BPF prog-id=235 op=UNLOAD May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit: BPF prog-id=236 op=LOAD May 10 00:51:27.775000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9b4b8ec0 a2=74 a3=540051 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.775000 audit: BPF prog-id=236 op=UNLOAD May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.775000 audit: BPF prog-id=237 op=LOAD May 10 00:51:27.775000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9b4b8ef0 a2=94 a3=2 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.775000 audit: BPF prog-id=237 op=UNLOAD May 10 00:51:27.899000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.899000 audit: BPF prog-id=238 op=LOAD May 10 00:51:27.899000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9b4b8db0 a2=40 a3=1 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.900000 audit: BPF prog-id=238 op=UNLOAD May 10 00:51:27.900000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.900000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9b4b8e80 a2=50 a3=7ffe9b4b8f60 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b4b8dc0 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b4b8df0 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b4b8d00 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b4b8e10 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b4b8df0 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b4b8de0 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b4b8e10 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b4b8df0 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b4b8e10 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b4b8de0 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b4b8e50 a2=28 a3=0 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9b4b8c00 a2=50 a3=1 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit: BPF prog-id=239 op=LOAD May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9b4b8c00 a2=94 a3=5 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit: BPF prog-id=239 op=UNLOAD May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9b4b8cb0 a2=50 a3=1 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9b4b8dd0 a2=4 a3=38 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.912000 audit[6533]: AVC avc: denied { confidentiality } for pid=6533 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:27.912000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9b4b8e20 a2=94 a3=6 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { confidentiality } for pid=6533 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:27.913000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9b4b85d0 a2=94 a3=83 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.913000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { perfmon } for pid=6533 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { bpf } for pid=6533 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.913000 audit[6533]: AVC avc: denied { confidentiality } for pid=6533 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:27.913000 audit[6533]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9b4b85d0 a2=94 a3=83 items=0 ppid=6513 pid=6533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.913000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit: BPF prog-id=240 op=LOAD May 10 00:51:27.915000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7fe663a0 a2=98 a3=3 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.915000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:27.915000 audit: BPF prog-id=240 op=UNLOAD May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit: BPF prog-id=241 op=LOAD May 10 00:51:27.915000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7fe66180 a2=74 a3=540051 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.915000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:27.915000 audit: BPF prog-id=241 op=UNLOAD May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:27.915000 audit: BPF prog-id=242 op=LOAD May 10 00:51:27.915000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7fe661b0 a2=94 a3=2 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:27.915000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:27.915000 audit: BPF prog-id=242 op=UNLOAD May 10 00:51:28.061000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.061000 audit: BPF prog-id=243 op=LOAD May 10 00:51:28.061000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc7fe66070 a2=40 a3=1 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.061000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.062000 audit: BPF prog-id=243 op=UNLOAD May 10 00:51:28.062000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.062000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc7fe66140 a2=50 a3=7ffc7fe66220 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.062000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.077000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.077000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7fe66080 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.077000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7fe660b0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7fe65fc0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7fe660d0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7fe660b0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7fe660a0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7fe660d0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7fe660b0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7fe660d0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7fe660a0 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.078000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.078000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc7fe66110 a2=28 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.081000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7fe65ec0 a2=50 a3=1 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.081000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.081000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.081000 audit: BPF prog-id=244 op=LOAD May 10 00:51:28.081000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7fe65ec0 a2=94 a3=5 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.081000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.082000 audit: BPF prog-id=244 op=UNLOAD May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc7fe65f70 a2=50 a3=1 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.082000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc7fe66090 a2=4 a3=38 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.082000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { confidentiality } for pid=6534 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:28.082000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7fe660e0 a2=94 a3=6 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.082000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.082000 audit[6534]: AVC avc: denied { confidentiality } for pid=6534 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:28.082000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7fe65890 a2=94 a3=83 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.082000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.083000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { perfmon } for pid=6534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.083000 audit[6534]: AVC avc: denied { confidentiality } for pid=6534 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:28.083000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc7fe65890 a2=94 a3=83 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.083000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.085000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.085000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=0 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.085000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.085000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=40 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.085000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.085000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=44 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=48 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=4c items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=50 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=54 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=55 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=56 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=57 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=58 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=59 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=5a items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=5b items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=5c items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=5d items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=5e items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=5f items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=60 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.087000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.087000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=61 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.087000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=62 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=63 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=64 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=65 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=66 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=67 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=68 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=69 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=6a items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.088000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.088000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=6d items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.088000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.089000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.089000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=6e items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.089000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.089000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.089000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=71 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.089000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.089000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.089000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=74 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.089000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.089000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.089000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=75 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.089000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.090000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.090000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=78 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.090000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.090000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=7d items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.090000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.090000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=80 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.090000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.090000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=8d items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.091000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.091000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=a5 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.091000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.091000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=a8 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.092000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.092000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=a9 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.092000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.092000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=ac items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.092000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=b1 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=b4 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=b5 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=b8 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=b9 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=bc items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=c1 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=c4 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=c5 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=c8 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.093000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.093000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=d3 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.093000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.094000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.094000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=d4 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.094000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.094000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.094000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=d7 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.094000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.094000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.094000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=d8 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.094000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.094000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.094000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=db items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.094000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.094000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.094000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=e2 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.094000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.094000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.094000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=e3 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.094000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.095000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.095000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=e6 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.095000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.095000 audit[6534]: AVC avc: denied { bpf } for pid=6534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.095000 audit[6534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc7fe672d0 a2=10 a3=e7 items=0 ppid=6513 pid=6534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.095000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E May 10 00:51:28.153000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.153000 audit: BPF prog-id=245 op=LOAD May 10 00:51:28.153000 audit[6543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffea1144d0 a2=98 a3=1999999999999999 items=0 ppid=6513 pid=6543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.153000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:28.154000 audit: BPF prog-id=245 op=UNLOAD May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit: BPF prog-id=246 op=LOAD May 10 00:51:28.154000 audit[6543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffea1143b0 a2=74 a3=ffff items=0 ppid=6513 pid=6543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.154000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:28.154000 audit: BPF prog-id=246 op=UNLOAD May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { perfmon } for pid=6543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit[6543]: AVC avc: denied { bpf } for pid=6543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:28.154000 audit: BPF prog-id=247 op=LOAD May 10 00:51:28.154000 audit[6543]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffea1143f0 a2=40 a3=7fffea1145d0 items=0 ppid=6513 pid=6543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.154000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:28.154000 audit: BPF prog-id=247 op=UNLOAD May 10 00:51:28.381840 systemd[1]: Started sshd@14-172.31.28.58:22-139.178.89.65:54412.service. May 10 00:51:28.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.58:22-139.178.89.65:54412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:28.629584 sshd[6562]: Accepted publickey for core from 139.178.89.65 port 54412 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:28.627000 audit[6562]: USER_ACCT pid=6562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:28.629000 audit[6562]: CRED_ACQ pid=6562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:28.629000 audit[6562]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1fc9690 a2=3 a3=0 items=0 ppid=1 pid=6562 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:28.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:28.632022 sshd[6562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:28.638191 systemd[1]: Started session-15.scope. May 10 00:51:28.639644 systemd-logind[1701]: New session 15 of user core. May 10 00:51:28.644000 audit[6562]: USER_START pid=6562 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:28.646000 audit[6564]: CRED_ACQ pid=6564 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.102016 sshd[6562]: pam_unix(sshd:session): session closed for user core May 10 00:51:29.104000 audit[6562]: USER_END pid=6562 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.106000 audit[6562]: CRED_DISP pid=6562 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:29.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.28.58:22-139.178.89.65:54412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:29.108507 systemd[1]: sshd@14-172.31.28.58:22-139.178.89.65:54412.service: Deactivated successfully. May 10 00:51:29.109693 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:51:29.110276 systemd-logind[1701]: Session 15 logged out. Waiting for processes to exit. May 10 00:51:29.111175 systemd-logind[1701]: Removed session 15. May 10 00:51:34.127631 systemd[1]: Started sshd@15-172.31.28.58:22-139.178.89.65:54416.service. May 10 00:51:34.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.58:22-139.178.89.65:54416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:34.129828 kernel: kauditd_printk_skb: 521 callbacks suppressed May 10 00:51:34.129958 kernel: audit: type=1130 audit(1746838294.127:1672): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.58:22-139.178.89.65:54416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:34.317000 audit[6670]: USER_ACCT pid=6670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.325794 kernel: audit: type=1101 audit(1746838294.317:1673): pid=6670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.325835 sshd[6670]: Accepted publickey for core from 139.178.89.65 port 54416 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:34.325000 audit[6670]: CRED_ACQ pid=6670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.332891 kernel: audit: type=1103 audit(1746838294.325:1674): pid=6670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.333008 kernel: audit: type=1006 audit(1746838294.325:1675): pid=6670 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:51:34.334530 sshd[6670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:34.325000 audit[6670]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bcdab20 a2=3 a3=0 items=0 ppid=1 pid=6670 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:34.337740 kernel: audit: type=1300 audit(1746838294.325:1675): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3bcdab20 a2=3 a3=0 items=0 ppid=1 pid=6670 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:34.325000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:34.347664 kernel: audit: type=1327 audit(1746838294.325:1675): proctitle=737368643A20636F7265205B707269765D May 10 00:51:34.349496 systemd[1]: Started session-16.scope. May 10 00:51:34.349851 systemd-logind[1701]: New session 16 of user core. May 10 00:51:34.354000 audit[6670]: USER_START pid=6670 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.369887 kernel: audit: type=1105 audit(1746838294.354:1676): pid=6670 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.370026 kernel: audit: type=1103 audit(1746838294.359:1677): pid=6672 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.359000 audit[6672]: CRED_ACQ pid=6672 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.603473 sshd[6670]: pam_unix(sshd:session): session closed for user core May 10 00:51:34.604000 audit[6670]: USER_END pid=6670 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.607869 systemd[1]: sshd@15-172.31.28.58:22-139.178.89.65:54416.service: Deactivated successfully. May 10 00:51:34.608676 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:51:34.611885 systemd-logind[1701]: Session 16 logged out. Waiting for processes to exit. May 10 00:51:34.613123 systemd-logind[1701]: Removed session 16. May 10 00:51:34.604000 audit[6670]: CRED_DISP pid=6670 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.619664 kernel: audit: type=1106 audit(1746838294.604:1678): pid=6670 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.619818 kernel: audit: type=1104 audit(1746838294.604:1679): pid=6670 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.28.58:22-139.178.89.65:54416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:34.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.28.58:22-139.178.89.65:54426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:34.629936 systemd[1]: Started sshd@16-172.31.28.58:22-139.178.89.65:54426.service. May 10 00:51:34.788000 audit[6681]: USER_ACCT pid=6681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.789130 sshd[6681]: Accepted publickey for core from 139.178.89.65 port 54426 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:34.789000 audit[6681]: CRED_ACQ pid=6681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.789000 audit[6681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbd224cc0 a2=3 a3=0 items=0 ppid=1 pid=6681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:34.789000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:34.790994 sshd[6681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:34.798660 systemd-logind[1701]: New session 17 of user core. May 10 00:51:34.799309 systemd[1]: Started session-17.scope. May 10 00:51:34.808000 audit[6681]: USER_START pid=6681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:34.810000 audit[6689]: CRED_ACQ pid=6689 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:35.620631 sshd[6681]: pam_unix(sshd:session): session closed for user core May 10 00:51:35.621000 audit[6681]: USER_END pid=6681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:35.621000 audit[6681]: CRED_DISP pid=6681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:35.625190 systemd[1]: sshd@16-172.31.28.58:22-139.178.89.65:54426.service: Deactivated successfully. May 10 00:51:35.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.28.58:22-139.178.89.65:54426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:35.626178 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:51:35.626705 systemd-logind[1701]: Session 17 logged out. Waiting for processes to exit. May 10 00:51:35.628014 systemd-logind[1701]: Removed session 17. May 10 00:51:35.647987 systemd[1]: Started sshd@17-172.31.28.58:22-139.178.89.65:54428.service. May 10 00:51:35.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.58:22-139.178.89.65:54428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:35.842000 audit[6709]: USER_ACCT pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:35.843248 sshd[6709]: Accepted publickey for core from 139.178.89.65 port 54428 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:35.843000 audit[6709]: CRED_ACQ pid=6709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:35.843000 audit[6709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf8a99420 a2=3 a3=0 items=0 ppid=1 pid=6709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:35.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:35.846109 sshd[6709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:35.853273 systemd[1]: Started session-18.scope. May 10 00:51:35.853607 systemd-logind[1701]: New session 18 of user core. May 10 00:51:35.859000 audit[6709]: USER_START pid=6709 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:35.860000 audit[6711]: CRED_ACQ pid=6711 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:36.970000 audit[6747]: NETFILTER_CFG table=filter:146 family=2 entries=20 op=nft_register_rule pid=6747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:36.970000 audit[6747]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe4de95c50 a2=0 a3=7ffe4de95c3c items=0 ppid=2761 pid=6747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:36.970000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:36.976000 audit[6747]: NETFILTER_CFG table=nat:147 family=2 entries=22 op=nft_register_rule pid=6747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:36.976000 audit[6747]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe4de95c50 a2=0 a3=0 items=0 ppid=2761 pid=6747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:36.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:36.987957 sshd[6709]: pam_unix(sshd:session): session closed for user core May 10 00:51:36.988000 audit[6709]: USER_END pid=6709 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:36.989000 audit[6709]: CRED_DISP pid=6709 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:36.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.28.58:22-139.178.89.65:54428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:36.991907 systemd[1]: sshd@17-172.31.28.58:22-139.178.89.65:54428.service: Deactivated successfully. May 10 00:51:36.993691 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:51:36.994040 systemd-logind[1701]: Session 18 logged out. Waiting for processes to exit. May 10 00:51:36.996742 systemd-logind[1701]: Removed session 18. May 10 00:51:37.016895 systemd[1]: Started sshd@18-172.31.28.58:22-139.178.89.65:36026.service. May 10 00:51:37.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.58:22-139.178.89.65:36026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:37.041000 audit[6751]: NETFILTER_CFG table=filter:148 family=2 entries=32 op=nft_register_rule pid=6751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:37.041000 audit[6751]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdb33ccef0 a2=0 a3=7ffdb33ccedc items=0 ppid=2761 pid=6751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:37.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:37.045000 audit[6751]: NETFILTER_CFG table=nat:149 family=2 entries=22 op=nft_register_rule pid=6751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:37.045000 audit[6751]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb33ccef0 a2=0 a3=0 items=0 ppid=2761 pid=6751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:37.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:37.185000 audit[6752]: USER_ACCT pid=6752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:37.186112 sshd[6752]: Accepted publickey for core from 139.178.89.65 port 36026 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:37.186000 audit[6752]: CRED_ACQ pid=6752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:37.186000 audit[6752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0858a5c0 a2=3 a3=0 items=0 ppid=1 pid=6752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:37.186000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:37.187458 sshd[6752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:37.193216 systemd[1]: Started session-19.scope. May 10 00:51:37.194254 systemd-logind[1701]: New session 19 of user core. May 10 00:51:37.198000 audit[6752]: USER_START pid=6752 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:37.200000 audit[6760]: CRED_ACQ pid=6760 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:37.810587 sshd[6752]: pam_unix(sshd:session): session closed for user core May 10 00:51:37.813000 audit[6752]: USER_END pid=6752 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:37.813000 audit[6752]: CRED_DISP pid=6752 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:37.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.28.58:22-139.178.89.65:36026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:37.815797 systemd[1]: sshd@18-172.31.28.58:22-139.178.89.65:36026.service: Deactivated successfully. May 10 00:51:37.816728 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:51:37.817312 systemd-logind[1701]: Session 19 logged out. Waiting for processes to exit. May 10 00:51:37.818503 systemd-logind[1701]: Removed session 19. May 10 00:51:37.835984 systemd[1]: Started sshd@19-172.31.28.58:22-139.178.89.65:36040.service. May 10 00:51:37.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.58:22-139.178.89.65:36040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:38.023000 audit[6781]: USER_ACCT pid=6781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:38.024685 sshd[6781]: Accepted publickey for core from 139.178.89.65 port 36040 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:38.025000 audit[6781]: CRED_ACQ pid=6781 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:38.025000 audit[6781]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1799cbd0 a2=3 a3=0 items=0 ppid=1 pid=6781 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:38.025000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:38.027650 sshd[6781]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:38.034134 systemd[1]: Started session-20.scope. May 10 00:51:38.035101 systemd-logind[1701]: New session 20 of user core. May 10 00:51:38.040000 audit[6781]: USER_START pid=6781 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:38.041000 audit[6783]: CRED_ACQ pid=6783 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:38.233387 sshd[6781]: pam_unix(sshd:session): session closed for user core May 10 00:51:38.234000 audit[6781]: USER_END pid=6781 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:38.234000 audit[6781]: CRED_DISP pid=6781 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:38.237919 systemd[1]: sshd@19-172.31.28.58:22-139.178.89.65:36040.service: Deactivated successfully. May 10 00:51:38.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.28.58:22-139.178.89.65:36040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:38.238694 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:51:38.239250 systemd-logind[1701]: Session 20 logged out. Waiting for processes to exit. May 10 00:51:38.240021 systemd-logind[1701]: Removed session 20. May 10 00:51:43.150000 audit[6899]: NETFILTER_CFG table=filter:150 family=2 entries=20 op=nft_register_rule pid=6899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:43.153208 kernel: kauditd_printk_skb: 57 callbacks suppressed May 10 00:51:43.153317 kernel: audit: type=1325 audit(1746838303.150:1721): table=filter:150 family=2 entries=20 op=nft_register_rule pid=6899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:43.150000 audit[6899]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdc1e466d0 a2=0 a3=7ffdc1e466bc items=0 ppid=2761 pid=6899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.169759 kernel: audit: type=1300 audit(1746838303.150:1721): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdc1e466d0 a2=0 a3=7ffdc1e466bc items=0 ppid=2761 pid=6899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.170518 kernel: audit: type=1327 audit(1746838303.150:1721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:43.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:43.172774 kernel: audit: type=1325 audit(1746838303.160:1722): table=nat:151 family=2 entries=106 op=nft_register_chain pid=6899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:43.160000 audit[6899]: NETFILTER_CFG table=nat:151 family=2 entries=106 op=nft_register_chain pid=6899 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:51:43.160000 audit[6899]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdc1e466d0 a2=0 a3=7ffdc1e466bc items=0 ppid=2761 pid=6899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.185688 kernel: audit: type=1300 audit(1746838303.160:1722): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdc1e466d0 a2=0 a3=7ffdc1e466bc items=0 ppid=2761 pid=6899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:43.190737 kernel: audit: type=1327 audit(1746838303.160:1722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:51:43.263194 systemd[1]: Started sshd@20-172.31.28.58:22-139.178.89.65:36042.service. May 10 00:51:43.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.58:22-139.178.89.65:36042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:43.273027 kernel: audit: type=1130 audit(1746838303.262:1723): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.58:22-139.178.89.65:36042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:43.486834 sshd[6909]: Accepted publickey for core from 139.178.89.65 port 36042 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:43.485000 audit[6909]: USER_ACCT pid=6909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.487000 audit[6909]: CRED_ACQ pid=6909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.507905 kernel: audit: type=1101 audit(1746838303.485:1724): pid=6909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.508045 kernel: audit: type=1103 audit(1746838303.487:1725): pid=6909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.509195 sshd[6909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:43.518762 kernel: audit: type=1006 audit(1746838303.487:1726): pid=6909 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 10 00:51:43.487000 audit[6909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3c3da5b0 a2=3 a3=0 items=0 ppid=1 pid=6909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:43.487000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:43.523418 systemd-logind[1701]: New session 21 of user core. May 10 00:51:43.524353 systemd[1]: Started session-21.scope. May 10 00:51:43.530000 audit[6909]: USER_START pid=6909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.532000 audit[6918]: CRED_ACQ pid=6918 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.843620 sshd[6909]: pam_unix(sshd:session): session closed for user core May 10 00:51:43.844000 audit[6909]: USER_END pid=6909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.844000 audit[6909]: CRED_DISP pid=6909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:43.846751 systemd[1]: sshd@20-172.31.28.58:22-139.178.89.65:36042.service: Deactivated successfully. May 10 00:51:43.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.28.58:22-139.178.89.65:36042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:43.847517 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:51:43.848300 systemd-logind[1701]: Session 21 logged out. Waiting for processes to exit. May 10 00:51:43.849304 systemd-logind[1701]: Removed session 21. May 10 00:51:48.871002 systemd[1]: Started sshd@21-172.31.28.58:22-139.178.89.65:57892.service. May 10 00:51:48.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.58:22-139.178.89.65:57892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:48.873736 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:51:48.873890 kernel: audit: type=1130 audit(1746838308.870:1732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.58:22-139.178.89.65:57892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:49.061000 audit[7006]: USER_ACCT pid=7006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.062081 sshd[7006]: Accepted publickey for core from 139.178.89.65 port 57892 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:49.063856 sshd[7006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:49.062000 audit[7006]: CRED_ACQ pid=7006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.075750 kernel: audit: type=1101 audit(1746838309.061:1733): pid=7006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.075845 kernel: audit: type=1103 audit(1746838309.062:1734): pid=7006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.080680 systemd-logind[1701]: New session 22 of user core. May 10 00:51:49.081509 systemd[1]: Started session-22.scope. May 10 00:51:49.062000 audit[7006]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37fd8a00 a2=3 a3=0 items=0 ppid=1 pid=7006 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:49.090793 kernel: audit: type=1006 audit(1746838309.062:1735): pid=7006 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 10 00:51:49.090902 kernel: audit: type=1300 audit(1746838309.062:1735): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37fd8a00 a2=3 a3=0 items=0 ppid=1 pid=7006 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:49.062000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:49.094292 kernel: audit: type=1327 audit(1746838309.062:1735): proctitle=737368643A20636F7265205B707269765D May 10 00:51:49.091000 audit[7006]: USER_START pid=7006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.095000 audit[7015]: CRED_ACQ pid=7015 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.110815 kernel: audit: type=1105 audit(1746838309.091:1736): pid=7006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.110935 kernel: audit: type=1103 audit(1746838309.095:1737): pid=7015 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.381455 sshd[7006]: pam_unix(sshd:session): session closed for user core May 10 00:51:49.382000 audit[7006]: USER_END pid=7006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.388184 systemd[1]: sshd@21-172.31.28.58:22-139.178.89.65:57892.service: Deactivated successfully. May 10 00:51:49.389263 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:51:49.391045 systemd-logind[1701]: Session 22 logged out. Waiting for processes to exit. May 10 00:51:49.392643 systemd-logind[1701]: Removed session 22. May 10 00:51:49.382000 audit[7006]: CRED_DISP pid=7006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.403047 kernel: audit: type=1106 audit(1746838309.382:1738): pid=7006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.403184 kernel: audit: type=1104 audit(1746838309.382:1739): pid=7006 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:49.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.28.58:22-139.178.89.65:57892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:50.860000 audit[4913]: AVC avc: denied { watch } for pid=4913 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_31.2048085772/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c30,c778 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c30,c778 tclass=file permissive=0 May 10 00:51:50.860000 audit[4913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023519a0 a2=fc6 a3=0 items=0 ppid=4841 pid=4913 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c30,c778 key=(null) May 10 00:51:50.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:51:52.382265 env[1711]: time="2025-05-10T00:51:52.382233321Z" level=info msg="StopContainer for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" with timeout 5 (s)" May 10 00:51:52.382997 env[1711]: time="2025-05-10T00:51:52.382975592Z" level=info msg="Stop container \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" with signal terminated" May 10 00:51:52.404381 systemd[1]: cri-containerd-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2.scope: Deactivated successfully. May 10 00:51:52.404614 systemd[1]: cri-containerd-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2.scope: Consumed 7.588s CPU time. May 10 00:51:52.433030 env[1711]: time="2025-05-10T00:51:52.432988385Z" level=info msg="shim disconnected" id=2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2 May 10 00:51:52.433198 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2-rootfs.mount: Deactivated successfully. May 10 00:51:52.433391 env[1711]: time="2025-05-10T00:51:52.433363899Z" level=warning msg="cleaning up after shim disconnected" id=2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2 namespace=k8s.io May 10 00:51:52.433495 env[1711]: time="2025-05-10T00:51:52.433482065Z" level=info msg="cleaning up dead shim" May 10 00:51:52.445463 env[1711]: time="2025-05-10T00:51:52.444484909Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7111 runtime=io.containerd.runc.v2\n" May 10 00:51:52.512822 env[1711]: time="2025-05-10T00:51:52.512701515Z" level=info msg="StopContainer for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" returns successfully" May 10 00:51:52.513587 env[1711]: time="2025-05-10T00:51:52.513397358Z" level=info msg="StopPodSandbox for \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\"" May 10 00:51:52.513587 env[1711]: time="2025-05-10T00:51:52.513457007Z" level=info msg="Container to stop \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:52.513587 env[1711]: time="2025-05-10T00:51:52.513471216Z" level=info msg="Container to stop \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:52.513587 env[1711]: time="2025-05-10T00:51:52.513481457Z" level=info msg="Container to stop \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:51:52.516458 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19-shm.mount: Deactivated successfully. May 10 00:51:52.523033 systemd[1]: cri-containerd-4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19.scope: Deactivated successfully. May 10 00:51:52.522000 audit: BPF prog-id=125 op=UNLOAD May 10 00:51:52.528000 audit: BPF prog-id=128 op=UNLOAD May 10 00:51:52.546050 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19-rootfs.mount: Deactivated successfully. May 10 00:51:52.548165 env[1711]: time="2025-05-10T00:51:52.548124263Z" level=info msg="shim disconnected" id=4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19 May 10 00:51:52.549118 env[1711]: time="2025-05-10T00:51:52.549093520Z" level=warning msg="cleaning up after shim disconnected" id=4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19 namespace=k8s.io May 10 00:51:52.549253 env[1711]: time="2025-05-10T00:51:52.549239568Z" level=info msg="cleaning up dead shim" May 10 00:51:52.558498 env[1711]: time="2025-05-10T00:51:52.558464797Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7143 runtime=io.containerd.runc.v2\n" May 10 00:51:52.576477 env[1711]: time="2025-05-10T00:51:52.576431297Z" level=info msg="TearDown network for sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" successfully" May 10 00:51:52.576477 env[1711]: time="2025-05-10T00:51:52.576470319Z" level=info msg="StopPodSandbox for \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" returns successfully" May 10 00:51:52.628505 kubelet[2592]: I0510 00:51:52.628460 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-xtables-lock\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.628952 kubelet[2592]: I0510 00:51:52.628569 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-lib-calico\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.628952 kubelet[2592]: I0510 00:51:52.628598 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-policysync\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.628952 kubelet[2592]: I0510 00:51:52.628622 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dbc649a2-900e-4501-a1b1-6c84dba9809f-tigera-ca-bundle\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.628952 kubelet[2592]: I0510 00:51:52.628635 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-net-dir\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.628952 kubelet[2592]: I0510 00:51:52.628648 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-log-dir\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.628952 kubelet[2592]: I0510 00:51:52.628672 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dbc649a2-900e-4501-a1b1-6c84dba9809f-node-certs\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.629148 kubelet[2592]: I0510 00:51:52.628686 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-bin-dir\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.629148 kubelet[2592]: I0510 00:51:52.628701 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-lib-modules\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.629148 kubelet[2592]: I0510 00:51:52.628740 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-run-calico\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.629148 kubelet[2592]: I0510 00:51:52.628760 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-zcmht\" (UniqueName: \"kubernetes.io/projected/dbc649a2-900e-4501-a1b1-6c84dba9809f-kube-api-access-zcmht\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.629148 kubelet[2592]: I0510 00:51:52.628788 2592 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-flexvol-driver-host\") pod \"dbc649a2-900e-4501-a1b1-6c84dba9809f\" (UID: \"dbc649a2-900e-4501-a1b1-6c84dba9809f\") " May 10 00:51:52.629415 kubelet[2592]: I0510 00:51:52.629380 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.629497 kubelet[2592]: I0510 00:51:52.629391 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.629572 kubelet[2592]: I0510 00:51:52.629561 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.629632 kubelet[2592]: I0510 00:51:52.629623 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.629691 kubelet[2592]: I0510 00:51:52.629683 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-policysync" (OuterVolumeSpecName: "policysync") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.642290 systemd[1]: var-lib-kubelet-pods-dbc649a2\x2d900e\x2d4501\x2da1b1\x2d6c84dba9809f-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 00:51:52.642407 systemd[1]: var-lib-kubelet-pods-dbc649a2\x2d900e\x2d4501\x2da1b1\x2d6c84dba9809f-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 00:51:52.646794 kubelet[2592]: I0510 00:51:52.645676 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.652917 kubelet[2592]: I0510 00:51:52.652883 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.653125 kubelet[2592]: I0510 00:51:52.653110 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.653212 kubelet[2592]: I0510 00:51:52.653202 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGIDValue "" May 10 00:51:52.655116 kubelet[2592]: I0510 00:51:52.655075 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/dbc649a2-900e-4501-a1b1-6c84dba9809f-node-certs" (OuterVolumeSpecName: "node-certs") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 10 00:51:52.656576 kubelet[2592]: I0510 00:51:52.656545 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/dbc649a2-900e-4501-a1b1-6c84dba9809f-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 10 00:51:52.658690 kubelet[2592]: I0510 00:51:52.658649 2592 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/dbc649a2-900e-4501-a1b1-6c84dba9809f-kube-api-access-zcmht" (OuterVolumeSpecName: "kube-api-access-zcmht") pod "dbc649a2-900e-4501-a1b1-6c84dba9809f" (UID: "dbc649a2-900e-4501-a1b1-6c84dba9809f"). InnerVolumeSpecName "kube-api-access-zcmht". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 10 00:51:52.660341 kubelet[2592]: I0510 00:51:52.660315 2592 memory_manager.go:355] "RemoveStaleState removing state" podUID="dbc649a2-900e-4501-a1b1-6c84dba9809f" containerName="calico-node" May 10 00:51:52.660483 kubelet[2592]: I0510 00:51:52.660473 2592 memory_manager.go:355] "RemoveStaleState removing state" podUID="676e568b-2bf3-47eb-a65d-861041d33df3" containerName="calico-typha" May 10 00:51:52.676438 systemd[1]: Created slice kubepods-besteffort-pod7187a744_fffa_4368_9dc0_a6a15680cd1c.slice. May 10 00:51:52.730109 kubelet[2592]: I0510 00:51:52.730043 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnmsn\" (UniqueName: \"kubernetes.io/projected/7187a744-fffa-4368-9dc0-a6a15680cd1c-kube-api-access-pnmsn\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730109 kubelet[2592]: I0510 00:51:52.730090 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7187a744-fffa-4368-9dc0-a6a15680cd1c-node-certs\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730109 kubelet[2592]: I0510 00:51:52.730108 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-policysync\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730361 kubelet[2592]: I0510 00:51:52.730124 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-var-lib-calico\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730361 kubelet[2592]: I0510 00:51:52.730146 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-flexvol-driver-host\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730361 kubelet[2592]: I0510 00:51:52.730161 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-xtables-lock\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730361 kubelet[2592]: I0510 00:51:52.730176 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-cni-net-dir\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730361 kubelet[2592]: I0510 00:51:52.730191 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-cni-log-dir\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730519 kubelet[2592]: I0510 00:51:52.730205 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-lib-modules\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730519 kubelet[2592]: I0510 00:51:52.730224 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-var-run-calico\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730519 kubelet[2592]: I0510 00:51:52.730239 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7187a744-fffa-4368-9dc0-a6a15680cd1c-tigera-ca-bundle\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730519 kubelet[2592]: I0510 00:51:52.730258 2592 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7187a744-fffa-4368-9dc0-a6a15680cd1c-cni-bin-dir\") pod \"calico-node-2k58x\" (UID: \"7187a744-fffa-4368-9dc0-a6a15680cd1c\") " pod="calico-system/calico-node-2k58x" May 10 00:51:52.730519 kubelet[2592]: I0510 00:51:52.730277 2592 reconciler_common.go:299] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-lib-modules\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730519 kubelet[2592]: I0510 00:51:52.730286 2592 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-zcmht\" (UniqueName: \"kubernetes.io/projected/dbc649a2-900e-4501-a1b1-6c84dba9809f-kube-api-access-zcmht\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730296 2592 reconciler_common.go:299] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-run-calico\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730304 2592 reconciler_common.go:299] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-flexvol-driver-host\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730312 2592 reconciler_common.go:299] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-xtables-lock\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730319 2592 reconciler_common.go:299] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-var-lib-calico\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730329 2592 reconciler_common.go:299] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-policysync\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730336 2592 reconciler_common.go:299] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-net-dir\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730344 2592 reconciler_common.go:299] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-log-dir\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730687 kubelet[2592]: I0510 00:51:52.730352 2592 reconciler_common.go:299] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dbc649a2-900e-4501-a1b1-6c84dba9809f-tigera-ca-bundle\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730977 kubelet[2592]: I0510 00:51:52.730360 2592 reconciler_common.go:299] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dbc649a2-900e-4501-a1b1-6c84dba9809f-node-certs\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.730977 kubelet[2592]: I0510 00:51:52.730368 2592 reconciler_common.go:299] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dbc649a2-900e-4501-a1b1-6c84dba9809f-cni-bin-dir\") on node \"ip-172-31-28-58\" DevicePath \"\"" May 10 00:51:52.755987 update_engine[1702]: I0510 00:51:52.754776 1702 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs May 10 00:51:52.756355 update_engine[1702]: I0510 00:51:52.756013 1702 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs May 10 00:51:52.761614 update_engine[1702]: I0510 00:51:52.761576 1702 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs May 10 00:51:52.763518 update_engine[1702]: I0510 00:51:52.763484 1702 omaha_request_params.cc:62] Current group set to lts May 10 00:51:52.770760 update_engine[1702]: I0510 00:51:52.770640 1702 update_attempter.cc:499] Already updated boot flags. Skipping. May 10 00:51:52.770760 update_engine[1702]: I0510 00:51:52.770663 1702 update_attempter.cc:643] Scheduling an action processor start. May 10 00:51:52.770760 update_engine[1702]: I0510 00:51:52.770684 1702 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 10 00:51:52.773160 update_engine[1702]: I0510 00:51:52.773128 1702 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs May 10 00:51:52.773937 update_engine[1702]: I0510 00:51:52.773226 1702 omaha_request_action.cc:270] Posting an Omaha request to disabled May 10 00:51:52.773937 update_engine[1702]: I0510 00:51:52.773231 1702 omaha_request_action.cc:271] Request: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: May 10 00:51:52.773937 update_engine[1702]: I0510 00:51:52.773238 1702 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:51:52.784070 update_engine[1702]: I0510 00:51:52.784034 1702 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:51:52.785571 update_engine[1702]: I0510 00:51:52.785542 1702 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:51:52.811436 locksmithd[1755]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 May 10 00:51:52.814399 update_engine[1702]: E0510 00:51:52.814357 1702 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:51:52.815541 update_engine[1702]: I0510 00:51:52.815510 1702 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 May 10 00:51:52.980875 env[1711]: time="2025-05-10T00:51:52.980744212Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2k58x,Uid:7187a744-fffa-4368-9dc0-a6a15680cd1c,Namespace:calico-system,Attempt:0,}" May 10 00:51:53.007025 env[1711]: time="2025-05-10T00:51:53.006941771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:51:53.007025 env[1711]: time="2025-05-10T00:51:53.006980986Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:51:53.007025 env[1711]: time="2025-05-10T00:51:53.006997881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:51:53.007620 env[1711]: time="2025-05-10T00:51:53.007567485Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221 pid=7170 runtime=io.containerd.runc.v2 May 10 00:51:53.022280 systemd[1]: Started cri-containerd-8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221.scope. May 10 00:51:53.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.038000 audit: BPF prog-id=248 op=LOAD May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=7170 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833343765643335373339663965356539353535303262633466363466 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=7170 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833343765643335373339663965356539353535303262633466363466 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit: BPF prog-id=249 op=LOAD May 10 00:51:53.039000 audit[7178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000256aa0 items=0 ppid=7170 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833343765643335373339663965356539353535303262633466363466 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit: BPF prog-id=250 op=LOAD May 10 00:51:53.039000 audit[7178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000256ae8 items=0 ppid=7170 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833343765643335373339663965356539353535303262633466363466 May 10 00:51:53.039000 audit: BPF prog-id=250 op=UNLOAD May 10 00:51:53.039000 audit: BPF prog-id=249 op=UNLOAD May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { perfmon } for pid=7178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit[7178]: AVC avc: denied { bpf } for pid=7178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.039000 audit: BPF prog-id=251 op=LOAD May 10 00:51:53.039000 audit[7178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000256ef8 items=0 ppid=7170 pid=7178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833343765643335373339663965356539353535303262633466363466 May 10 00:51:53.060417 env[1711]: time="2025-05-10T00:51:53.060366343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2k58x,Uid:7187a744-fffa-4368-9dc0-a6a15680cd1c,Namespace:calico-system,Attempt:0,} returns sandbox id \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\"" May 10 00:51:53.069311 env[1711]: time="2025-05-10T00:51:53.069269647Z" level=info msg="CreateContainer within sandbox \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:51:53.100146 env[1711]: time="2025-05-10T00:51:53.100102948Z" level=info msg="CreateContainer within sandbox \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214\"" May 10 00:51:53.101119 env[1711]: time="2025-05-10T00:51:53.101093024Z" level=info msg="StartContainer for \"b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214\"" May 10 00:51:53.134635 systemd[1]: Started cri-containerd-b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214.scope. May 10 00:51:53.165000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9e2902a578 items=0 ppid=7170 pid=7210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663531613039343334636234306265386561336262366466306332 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.165000 audit: BPF prog-id=252 op=LOAD May 10 00:51:53.165000 audit[7210]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a47e8 items=0 ppid=7170 pid=7210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663531613039343334636234306265386561336262366466306332 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit: BPF prog-id=253 op=LOAD May 10 00:51:53.166000 audit[7210]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a4838 items=0 ppid=7170 pid=7210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663531613039343334636234306265386561336262366466306332 May 10 00:51:53.166000 audit: BPF prog-id=253 op=UNLOAD May 10 00:51:53.166000 audit: BPF prog-id=252 op=UNLOAD May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { perfmon } for pid=7210 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit[7210]: AVC avc: denied { bpf } for pid=7210 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.166000 audit: BPF prog-id=254 op=LOAD May 10 00:51:53.166000 audit[7210]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a48c8 items=0 ppid=7170 pid=7210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663531613039343334636234306265386561336262366466306332 May 10 00:51:53.188013 env[1711]: time="2025-05-10T00:51:53.187962655Z" level=info msg="StartContainer for \"b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214\" returns successfully" May 10 00:51:53.294025 systemd[1]: cri-containerd-b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214.scope: Deactivated successfully. May 10 00:51:53.297000 audit: BPF prog-id=254 op=UNLOAD May 10 00:51:53.313578 systemd[1]: var-lib-kubelet-pods-dbc649a2\x2d900e\x2d4501\x2da1b1\x2d6c84dba9809f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dzcmht.mount: Deactivated successfully. May 10 00:51:53.324975 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214-rootfs.mount: Deactivated successfully. May 10 00:51:53.360000 audit[5336]: AVC avc: denied { watch } for pid=5336 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_50_51.1075195940/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c859 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c859 tclass=file permissive=0 May 10 00:51:53.360000 audit[5336]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000af30e0 a2=fc6 a3=0 items=0 ppid=5268 pid=5336 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c859 key=(null) May 10 00:51:53.360000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:51:53.364849 env[1711]: time="2025-05-10T00:51:53.364812867Z" level=info msg="shim disconnected" id=b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214 May 10 00:51:53.365100 env[1711]: time="2025-05-10T00:51:53.365082476Z" level=warning msg="cleaning up after shim disconnected" id=b7f51a09434cb40be8ea3bb6df0c2788d57d765059d91e9a6bcb11bf751fc214 namespace=k8s.io May 10 00:51:53.365179 env[1711]: time="2025-05-10T00:51:53.365168551Z" level=info msg="cleaning up dead shim" May 10 00:51:53.376206 env[1711]: time="2025-05-10T00:51:53.376147736Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7249 runtime=io.containerd.runc.v2\n" May 10 00:51:53.475757 kubelet[2592]: I0510 00:51:53.475729 2592 scope.go:117] "RemoveContainer" containerID="2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2" May 10 00:51:53.477392 env[1711]: time="2025-05-10T00:51:53.477352435Z" level=info msg="RemoveContainer for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\"" May 10 00:51:53.479179 env[1711]: time="2025-05-10T00:51:53.479137282Z" level=info msg="CreateContainer within sandbox \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:51:53.488476 env[1711]: time="2025-05-10T00:51:53.488415833Z" level=info msg="RemoveContainer for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" returns successfully" May 10 00:51:53.488777 kubelet[2592]: I0510 00:51:53.488709 2592 scope.go:117] "RemoveContainer" containerID="8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e" May 10 00:51:53.491685 systemd[1]: Removed slice kubepods-besteffort-poddbc649a2_900e_4501_a1b1_6c84dba9809f.slice. May 10 00:51:53.491840 systemd[1]: kubepods-besteffort-poddbc649a2_900e_4501_a1b1_6c84dba9809f.slice: Consumed 8.166s CPU time. May 10 00:51:53.495335 env[1711]: time="2025-05-10T00:51:53.495296568Z" level=info msg="RemoveContainer for \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\"" May 10 00:51:53.508024 env[1711]: time="2025-05-10T00:51:53.507983765Z" level=info msg="RemoveContainer for \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\" returns successfully" May 10 00:51:53.508604 kubelet[2592]: I0510 00:51:53.508503 2592 scope.go:117] "RemoveContainer" containerID="15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5" May 10 00:51:53.515152 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount389723057.mount: Deactivated successfully. May 10 00:51:53.518944 env[1711]: time="2025-05-10T00:51:53.518873915Z" level=info msg="RemoveContainer for \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\"" May 10 00:51:53.528956 env[1711]: time="2025-05-10T00:51:53.528912519Z" level=info msg="CreateContainer within sandbox \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2\"" May 10 00:51:53.529989 env[1711]: time="2025-05-10T00:51:53.529962200Z" level=info msg="StartContainer for \"1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2\"" May 10 00:51:53.539432 env[1711]: time="2025-05-10T00:51:53.539373533Z" level=info msg="RemoveContainer for \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\" returns successfully" May 10 00:51:53.544499 kubelet[2592]: I0510 00:51:53.543375 2592 scope.go:117] "RemoveContainer" containerID="2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2" May 10 00:51:53.545114 env[1711]: time="2025-05-10T00:51:53.544971768Z" level=error msg="ContainerStatus for \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\": not found" May 10 00:51:53.553913 kubelet[2592]: E0510 00:51:53.553512 2592 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\": not found" containerID="2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2" May 10 00:51:53.553913 kubelet[2592]: I0510 00:51:53.553589 2592 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2"} err="failed to get container status \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\": rpc error: code = NotFound desc = an error occurred when try to find container \"2566d5ad8eb924d3952e10e3aedbb67dbff6ddb120c33b25f41d8a30ab4256a2\": not found" May 10 00:51:53.553913 kubelet[2592]: I0510 00:51:53.553625 2592 scope.go:117] "RemoveContainer" containerID="8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e" May 10 00:51:53.554672 env[1711]: time="2025-05-10T00:51:53.554569294Z" level=error msg="ContainerStatus for \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\": not found" May 10 00:51:53.555493 kubelet[2592]: E0510 00:51:53.555236 2592 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\": not found" containerID="8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e" May 10 00:51:53.555493 kubelet[2592]: I0510 00:51:53.555292 2592 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e"} err="failed to get container status \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\": rpc error: code = NotFound desc = an error occurred when try to find container \"8e11944eccbe9227b35a3a3cd5e2cb26b83231d702bcda50154a20bf0adbc25e\": not found" May 10 00:51:53.555493 kubelet[2592]: I0510 00:51:53.555319 2592 scope.go:117] "RemoveContainer" containerID="15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5" May 10 00:51:53.556157 env[1711]: time="2025-05-10T00:51:53.556077047Z" level=error msg="ContainerStatus for \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\": not found" May 10 00:51:53.556585 kubelet[2592]: E0510 00:51:53.556506 2592 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\": not found" containerID="15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5" May 10 00:51:53.556585 kubelet[2592]: I0510 00:51:53.556558 2592 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5"} err="failed to get container status \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\": rpc error: code = NotFound desc = an error occurred when try to find container \"15eef87e8d9db46d60ffa00e3a16b7a682d428bce11131be5f7a7ce70084c9c5\": not found" May 10 00:51:53.568673 systemd[1]: Started cri-containerd-1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2.scope. May 10 00:51:53.590000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8444818718 items=0 ppid=7170 pid=7276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132383838383736373162366237393432643834666162366438343030 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.590000 audit: BPF prog-id=255 op=LOAD May 10 00:51:53.590000 audit[7276]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000293f08 items=0 ppid=7170 pid=7276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132383838383736373162366237393432643834666162366438343030 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.591000 audit: BPF prog-id=256 op=LOAD May 10 00:51:53.591000 audit[7276]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000293f58 items=0 ppid=7170 pid=7276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132383838383736373162366237393432643834666162366438343030 May 10 00:51:53.592000 audit: BPF prog-id=256 op=UNLOAD May 10 00:51:53.592000 audit: BPF prog-id=255 op=UNLOAD May 10 00:51:53.592000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { perfmon } for pid=7276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit[7276]: AVC avc: denied { bpf } for pid=7276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:53.592000 audit: BPF prog-id=257 op=LOAD May 10 00:51:53.592000 audit[7276]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000293fe8 items=0 ppid=7170 pid=7276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:53.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132383838383736373162366237393432643834666162366438343030 May 10 00:51:53.615686 env[1711]: time="2025-05-10T00:51:53.615639371Z" level=info msg="StartContainer for \"1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2\" returns successfully" May 10 00:51:53.680501 kubelet[2592]: I0510 00:51:53.680466 2592 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="dbc649a2-900e-4501-a1b1-6c84dba9809f" path="/var/lib/kubelet/pods/dbc649a2-900e-4501-a1b1-6c84dba9809f/volumes" May 10 00:51:54.408058 systemd[1]: Started sshd@22-172.31.28.58:22-139.178.89.65:57904.service. May 10 00:51:54.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.58:22-139.178.89.65:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:54.412471 kernel: kauditd_printk_skb: 153 callbacks suppressed May 10 00:51:54.412584 kernel: audit: type=1130 audit(1746838314.407:1776): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.58:22-139.178.89.65:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:54.627000 audit[7305]: USER_ACCT pid=7305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.628240 sshd[7305]: Accepted publickey for core from 139.178.89.65 port 57904 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:51:54.638792 kernel: audit: type=1101 audit(1746838314.627:1777): pid=7305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.638000 audit[7305]: CRED_ACQ pid=7305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.640756 sshd[7305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:54.654406 kernel: audit: type=1103 audit(1746838314.638:1778): pid=7305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.665662 kernel: audit: type=1006 audit(1746838314.638:1779): pid=7305 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:51:54.672336 kernel: audit: type=1300 audit(1746838314.638:1779): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff21c0ed0 a2=3 a3=0 items=0 ppid=1 pid=7305 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:54.672409 kernel: audit: type=1327 audit(1746838314.638:1779): proctitle=737368643A20636F7265205B707269765D May 10 00:51:54.638000 audit[7305]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff21c0ed0 a2=3 a3=0 items=0 ppid=1 pid=7305 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:54.638000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:54.649793 systemd[1]: Started session-23.scope. May 10 00:51:54.651941 systemd-logind[1701]: New session 23 of user core. May 10 00:51:54.666000 audit[7305]: USER_START pid=7305 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.673000 audit[7307]: CRED_ACQ pid=7307 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.694896 kernel: audit: type=1105 audit(1746838314.666:1780): pid=7305 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:54.695090 kernel: audit: type=1103 audit(1746838314.673:1781): pid=7307 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:55.886947 systemd[1]: run-containerd-runc-k8s.io-d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a-runc.THSEmt.mount: Deactivated successfully. May 10 00:51:56.111165 env[1711]: time="2025-05-10T00:51:56.110858508Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 10 00:51:56.111165 env[1711]: time="2025-05-10T00:51:56.111107025Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" May 10 00:51:56.114266 systemd[1]: cri-containerd-1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2.scope: Deactivated successfully. May 10 00:51:56.114556 systemd[1]: cri-containerd-1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2.scope: Consumed 1.023s CPU time. May 10 00:51:56.116000 audit: BPF prog-id=257 op=UNLOAD May 10 00:51:56.121827 kernel: audit: type=1334 audit(1746838316.116:1782): prog-id=257 op=UNLOAD May 10 00:51:56.144421 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2-rootfs.mount: Deactivated successfully. May 10 00:51:56.180758 env[1711]: time="2025-05-10T00:51:56.180659123Z" level=info msg="shim disconnected" id=1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2 May 10 00:51:56.180758 env[1711]: time="2025-05-10T00:51:56.180709084Z" level=warning msg="cleaning up after shim disconnected" id=1288887671b6b7942d84fab6d84001fddd2ccb95d15c0f4935773e25d85e02c2 namespace=k8s.io May 10 00:51:56.180758 env[1711]: time="2025-05-10T00:51:56.180735360Z" level=info msg="cleaning up dead shim" May 10 00:51:56.190297 env[1711]: time="2025-05-10T00:51:56.190254497Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:51:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7346 runtime=io.containerd.runc.v2\n" May 10 00:51:56.219379 sshd[7305]: pam_unix(sshd:session): session closed for user core May 10 00:51:56.224000 audit[7305]: USER_END pid=7305 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:56.234795 kernel: audit: type=1106 audit(1746838316.224:1783): pid=7305 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:56.226000 audit[7305]: CRED_DISP pid=7305 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:51:56.236139 systemd[1]: sshd@22-172.31.28.58:22-139.178.89.65:57904.service: Deactivated successfully. May 10 00:51:56.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.28.58:22-139.178.89.65:57904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:56.236952 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:51:56.237567 systemd-logind[1701]: Session 23 logged out. Waiting for processes to exit. May 10 00:51:56.238371 systemd-logind[1701]: Removed session 23. May 10 00:51:56.986798 env[1711]: time="2025-05-10T00:51:56.986558412Z" level=info msg="CreateContainer within sandbox \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:51:57.033340 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2995387876.mount: Deactivated successfully. May 10 00:51:57.039812 env[1711]: time="2025-05-10T00:51:57.039764362Z" level=info msg="CreateContainer within sandbox \"8347ed35739f9e5e955502bc4f64f9413edeee53cbae38262b5b5cc7e3ab1221\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8939be2a70bd1bd4bba30b4f1434eb9c38c08c91918fdce5c2b46b89f6ad28fd\"" May 10 00:51:57.042812 env[1711]: time="2025-05-10T00:51:57.042776380Z" level=info msg="StartContainer for \"8939be2a70bd1bd4bba30b4f1434eb9c38c08c91918fdce5c2b46b89f6ad28fd\"" May 10 00:51:57.064347 systemd[1]: Started cri-containerd-8939be2a70bd1bd4bba30b4f1434eb9c38c08c91918fdce5c2b46b89f6ad28fd.scope. May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f02b07b7d48 items=0 ppid=7170 pid=7369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333962653261373062643162643462626133306234663134333465 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit: BPF prog-id=258 op=LOAD May 10 00:51:57.102000 audit[7369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001fe068 items=0 ppid=7170 pid=7369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333962653261373062643162643462626133306234663134333465 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit: BPF prog-id=259 op=LOAD May 10 00:51:57.102000 audit[7369]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001fe0b8 items=0 ppid=7170 pid=7369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333962653261373062643162643462626133306234663134333465 May 10 00:51:57.102000 audit: BPF prog-id=259 op=UNLOAD May 10 00:51:57.102000 audit: BPF prog-id=258 op=UNLOAD May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { perfmon } for pid=7369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit[7369]: AVC avc: denied { bpf } for pid=7369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:57.102000 audit: BPF prog-id=260 op=LOAD May 10 00:51:57.102000 audit[7369]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001fe148 items=0 ppid=7170 pid=7369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:57.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839333962653261373062643162643462626133306234663134333465 May 10 00:51:57.142734 env[1711]: time="2025-05-10T00:51:57.142677962Z" level=info msg="StartContainer for \"8939be2a70bd1bd4bba30b4f1434eb9c38c08c91918fdce5c2b46b89f6ad28fd\" returns successfully" May 10 00:51:58.023021 kubelet[2592]: I0510 00:51:58.015782 2592 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-2k58x" podStartSLOduration=6.002950322 podStartE2EDuration="6.002950322s" podCreationTimestamp="2025-05-10 00:51:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:51:57.995019141 +0000 UTC m=+108.568945958" watchObservedRunningTime="2025-05-10 00:51:58.002950322 +0000 UTC m=+108.576877136" May 10 00:51:58.804000 audit[7509]: AVC avc: denied { write } for pid=7509 comm="tee" name="fd" dev="proc" ino=38387 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.804000 audit[7509]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe93756a26 a2=241 a3=1b6 items=1 ppid=7460 pid=7509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.804000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:51:58.804000 audit: PATH item=0 name="/dev/fd/63" inode=38384 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.804000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.804000 audit[7487]: AVC avc: denied { write } for pid=7487 comm="tee" name="fd" dev="proc" ino=37832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.807000 audit[7503]: AVC avc: denied { write } for pid=7503 comm="tee" name="fd" dev="proc" ino=38392 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.807000 audit[7503]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe67f22a16 a2=241 a3=1b6 items=1 ppid=7456 pid=7503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.807000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:51:58.807000 audit: PATH item=0 name="/dev/fd/63" inode=37821 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.807000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.808000 audit[7499]: AVC avc: denied { write } for pid=7499 comm="tee" name="fd" dev="proc" ino=37839 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.808000 audit[7499]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd2af1a27 a2=241 a3=1b6 items=1 ppid=7452 pid=7499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.808000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:51:58.808000 audit: PATH item=0 name="/dev/fd/63" inode=37819 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.808000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.804000 audit[7487]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcae0ea26 a2=241 a3=1b6 items=1 ppid=7453 pid=7487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.804000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:51:58.804000 audit: PATH item=0 name="/dev/fd/63" inode=37811 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.804000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.822000 audit[7493]: AVC avc: denied { write } for pid=7493 comm="tee" name="fd" dev="proc" ino=37844 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.822000 audit[7493]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7dbe0a26 a2=241 a3=1b6 items=1 ppid=7449 pid=7493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.822000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:51:58.822000 audit: PATH item=0 name="/dev/fd/63" inode=37816 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.822000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.823000 audit[7515]: AVC avc: denied { write } for pid=7515 comm="tee" name="fd" dev="proc" ino=37848 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.823000 audit[7515]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9453ba28 a2=241 a3=1b6 items=1 ppid=7454 pid=7515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.823000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:51:58.823000 audit: PATH item=0 name="/dev/fd/63" inode=37836 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.829000 audit[7505]: AVC avc: denied { write } for pid=7505 comm="tee" name="fd" dev="proc" ino=37852 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:51:58.829000 audit[7505]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1d217a17 a2=241 a3=1b6 items=1 ppid=7448 pid=7505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:58.829000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:51:58.829000 audit: PATH item=0 name="/dev/fd/63" inode=37825 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:51:58.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:51:58.985125 systemd[1]: run-containerd-runc-k8s.io-8939be2a70bd1bd4bba30b4f1434eb9c38c08c91918fdce5c2b46b89f6ad28fd-runc.RzaBgO.mount: Deactivated successfully. May 10 00:51:59.214000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.214000 audit: BPF prog-id=261 op=LOAD May 10 00:51:59.214000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc78944360 a2=98 a3=3 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.214000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.214000 audit: BPF prog-id=261 op=UNLOAD May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit: BPF prog-id=262 op=LOAD May 10 00:51:59.216000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc78944140 a2=74 a3=540051 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.216000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.216000 audit: BPF prog-id=262 op=UNLOAD May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.216000 audit: BPF prog-id=263 op=LOAD May 10 00:51:59.216000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc78944170 a2=94 a3=2 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.216000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.216000 audit: BPF prog-id=263 op=UNLOAD May 10 00:51:59.334000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit: BPF prog-id=264 op=LOAD May 10 00:51:59.334000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc78944030 a2=40 a3=1 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.334000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.334000 audit: BPF prog-id=264 op=UNLOAD May 10 00:51:59.334000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.334000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc78944100 a2=50 a3=7ffc789441e0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.334000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc78944040 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc78944070 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc78943f80 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc78944090 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc78944070 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc78944060 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc78944090 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc78944070 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc78944090 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc78944060 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.345000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.345000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc789440d0 a2=28 a3=0 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.345000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc78943e80 a2=50 a3=1 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit: BPF prog-id=265 op=LOAD May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc78943e80 a2=94 a3=5 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit: BPF prog-id=265 op=UNLOAD May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc78943f30 a2=50 a3=1 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc78944050 a2=4 a3=38 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { confidentiality } for pid=7581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc789440a0 a2=94 a3=6 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { confidentiality } for pid=7581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc78943850 a2=94 a3=83 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { perfmon } for pid=7581 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { bpf } for pid=7581 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.346000 audit[7581]: AVC avc: denied { confidentiality } for pid=7581 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:59.346000 audit[7581]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc78943850 a2=94 a3=83 items=0 ppid=7451 pid=7581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.346000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit: BPF prog-id=266 op=LOAD May 10 00:51:59.385000 audit[7584]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf0b3dc30 a2=98 a3=1999999999999999 items=0 ppid=7451 pid=7584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.385000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:59.385000 audit: BPF prog-id=266 op=UNLOAD May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit: BPF prog-id=267 op=LOAD May 10 00:51:59.385000 audit[7584]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf0b3db10 a2=74 a3=ffff items=0 ppid=7451 pid=7584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.385000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:59.385000 audit: BPF prog-id=267 op=UNLOAD May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { perfmon } for pid=7584 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit[7584]: AVC avc: denied { bpf } for pid=7584 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.385000 audit: BPF prog-id=268 op=LOAD May 10 00:51:59.385000 audit[7584]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf0b3db50 a2=40 a3=7ffdf0b3dd30 items=0 ppid=7451 pid=7584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.385000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:51:59.385000 audit: BPF prog-id=268 op=UNLOAD May 10 00:51:59.494937 kernel: kauditd_printk_skb: 268 callbacks suppressed May 10 00:51:59.495126 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.497745 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:51:59.500495 kernel: audit: audit_lost=68 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:51:59.509786 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.511108 kernel: audit: backlog limit exceeded May 10 00:51:59.483000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.529541 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.529672 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.523033 (udev-worker)[7609]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:59.523878 (udev-worker)[7608]: Network interface NamePolicy= disabled on kernel command line. May 10 00:51:59.483000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.543126 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.543260 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.543296 kernel: audit: type=1400 audit(1746838319.483:1833): avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.483000 audit: BPF prog-id=269 op=LOAD May 10 00:51:59.483000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd63483e30 a2=98 a3=ffffffff items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.483000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit: BPF prog-id=269 op=UNLOAD May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit: BPF prog-id=270 op=LOAD May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd63483c40 a2=74 a3=540051 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit: BPF prog-id=270 op=UNLOAD May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit: BPF prog-id=271 op=LOAD May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd63483c70 a2=94 a3=2 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit: BPF prog-id=271 op=UNLOAD May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd63483b40 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd63483b70 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd63483a80 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd63483b90 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.494000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.494000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd63483b70 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.494000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.495000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.495000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd63483b60 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.495000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.510000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.510000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd63483b70 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.510000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd63483b90 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.548000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd63483b60 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.548000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd63483bd0 a2=28 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.548000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.548000 audit: BPF prog-id=272 op=LOAD May 10 00:51:59.548000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd63483a40 a2=40 a3=0 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.548000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.548000 audit: BPF prog-id=272 op=UNLOAD May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd63483a30 a2=50 a3=2800 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd63483a30 a2=50 a3=2800 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit: BPF prog-id=273 op=LOAD May 10 00:51:59.549000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd63483250 a2=94 a3=2 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.549000 audit: BPF prog-id=273 op=UNLOAD May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { perfmon } for pid=7607 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit[7607]: AVC avc: denied { bpf } for pid=7607 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.549000 audit: BPF prog-id=274 op=LOAD May 10 00:51:59.549000 audit[7607]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd63483350 a2=94 a3=30 items=0 ppid=7451 pid=7607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.549000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit: BPF prog-id=275 op=LOAD May 10 00:51:59.555000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff59ac9d10 a2=98 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.555000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.555000 audit: BPF prog-id=275 op=UNLOAD May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit: BPF prog-id=276 op=LOAD May 10 00:51:59.555000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff59ac9af0 a2=74 a3=540051 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.555000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.555000 audit: BPF prog-id=276 op=UNLOAD May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.555000 audit: BPF prog-id=277 op=LOAD May 10 00:51:59.555000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff59ac9b20 a2=94 a3=2 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.555000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.555000 audit: BPF prog-id=277 op=UNLOAD May 10 00:51:59.692000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit: BPF prog-id=278 op=LOAD May 10 00:51:59.692000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff59ac99e0 a2=40 a3=1 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.692000 audit: BPF prog-id=278 op=UNLOAD May 10 00:51:59.692000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.692000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff59ac9ab0 a2=50 a3=7fff59ac9b90 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.692000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.702000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.702000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff59ac99f0 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff59ac9a20 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff59ac9930 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff59ac9a40 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff59ac9a20 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff59ac9a10 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff59ac9a40 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff59ac9a20 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff59ac9a40 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff59ac9a10 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff59ac9a80 a2=28 a3=0 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff59ac9830 a2=50 a3=1 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit: BPF prog-id=279 op=LOAD May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff59ac9830 a2=94 a3=5 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit: BPF prog-id=279 op=UNLOAD May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff59ac98e0 a2=50 a3=1 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff59ac9a00 a2=4 a3=38 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.703000 audit[7613]: AVC avc: denied { confidentiality } for pid=7613 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:59.703000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff59ac9a50 a2=94 a3=6 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { confidentiality } for pid=7613 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:59.704000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff59ac9200 a2=94 a3=83 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { perfmon } for pid=7613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { confidentiality } for pid=7613 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:51:59.704000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff59ac9200 a2=94 a3=83 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.704000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.704000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff59acac40 a2=10 a3=f1f00800 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.705000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.705000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff59acaae0 a2=10 a3=3 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.705000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.705000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff59acaa80 a2=10 a3=3 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.705000 audit[7613]: AVC avc: denied { bpf } for pid=7613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:51:59.705000 audit[7613]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff59acaa80 a2=10 a3=7 items=0 ppid=7451 pid=7613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:59.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:51:59.713000 audit: BPF prog-id=274 op=UNLOAD May 10 00:52:01.246886 systemd[1]: Started sshd@23-172.31.28.58:22-139.178.89.65:46194.service. May 10 00:52:01.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.58:22-139.178.89.65:46194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:01.517000 audit[7653]: USER_ACCT pid=7653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:01.518193 sshd[7653]: Accepted publickey for core from 139.178.89.65 port 46194 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:52:01.529000 audit[7653]: CRED_ACQ pid=7653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:01.529000 audit[7653]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0ccc18b0 a2=3 a3=0 items=0 ppid=1 pid=7653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:01.529000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:01.543033 sshd[7653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:01.602076 systemd-logind[1701]: New session 24 of user core. May 10 00:52:01.603035 systemd[1]: Started session-24.scope. May 10 00:52:01.636000 audit[7653]: USER_START pid=7653 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:01.639000 audit[7656]: CRED_ACQ pid=7656 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:02.757364 update_engine[1702]: I0510 00:52:02.754788 1702 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:02.760776 update_engine[1702]: I0510 00:52:02.758515 1702 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:02.760776 update_engine[1702]: I0510 00:52:02.760282 1702 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:02.762962 update_engine[1702]: E0510 00:52:02.762809 1702 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:02.762962 update_engine[1702]: I0510 00:52:02.762936 1702 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 May 10 00:52:02.876450 sshd[7653]: pam_unix(sshd:session): session closed for user core May 10 00:52:02.880000 audit[7653]: USER_END pid=7653 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:02.881000 audit[7653]: CRED_DISP pid=7653 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:02.884491 systemd[1]: sshd@23-172.31.28.58:22-139.178.89.65:46194.service: Deactivated successfully. May 10 00:52:02.885533 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:52:02.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.28.58:22-139.178.89.65:46194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:02.886552 systemd-logind[1701]: Session 24 logged out. Waiting for processes to exit. May 10 00:52:02.887560 systemd-logind[1701]: Removed session 24. May 10 00:52:04.341000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:04.341000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011735f0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:04.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:04.341000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:04.341000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002229d60 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:04.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:05.354000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.359773 kernel: kauditd_printk_skb: 287 callbacks suppressed May 10 00:52:05.359947 kernel: audit: type=1400 audit(1746838325.354:1901): avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.354000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.375129 kernel: audit: type=1400 audit(1746838325.354:1900): avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.354000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00fadd230 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.384659 kernel: audit: type=1300 audit(1746838325.354:1901): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00fadd230 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.354000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e39fa80 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.405513 kernel: audit: type=1327 audit(1746838325.354:1901): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.405647 kernel: audit: type=1300 audit(1746838325.354:1900): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e39fa80 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.405690 kernel: audit: type=1327 audit(1746838325.354:1900): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.384000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.421649 kernel: audit: type=1400 audit(1746838325.384:1902): avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.421813 kernel: audit: type=1300 audit(1746838325.384:1902): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00f392840 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.384000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00f392840 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.439377 kernel: audit: type=1327 audit(1746838325.384:1902): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.439545 kernel: audit: type=1400 audit(1746838325.388:1903): avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.388000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.388000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00fadd320 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.388000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.399000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.399000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00fadd440 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.399000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:05.403000 audit[2427]: AVC avc: denied { watch } for pid=2427 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:05.403000 audit[2427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00fadd4d0 a2=fc6 a3=0 items=0 ppid=2270 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c555,c611 key=(null) May 10 00:52:05.403000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32382E3538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 00:52:07.901886 systemd[1]: Started sshd@24-172.31.28.58:22-139.178.89.65:54902.service. May 10 00:52:07.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.58:22-139.178.89.65:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:08.086000 audit[7674]: USER_ACCT pid=7674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:08.087653 sshd[7674]: Accepted publickey for core from 139.178.89.65 port 54902 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:52:08.087000 audit[7674]: CRED_ACQ pid=7674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:08.087000 audit[7674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaf0e26b0 a2=3 a3=0 items=0 ppid=1 pid=7674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:08.087000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:08.089616 sshd[7674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:08.097802 systemd-logind[1701]: New session 25 of user core. May 10 00:52:08.098188 systemd[1]: Started session-25.scope. May 10 00:52:08.104000 audit[7674]: USER_START pid=7674 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:08.105000 audit[7676]: CRED_ACQ pid=7676 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:08.342285 sshd[7674]: pam_unix(sshd:session): session closed for user core May 10 00:52:08.343000 audit[7674]: USER_END pid=7674 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:08.343000 audit[7674]: CRED_DISP pid=7674 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:08.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.28.58:22-139.178.89.65:54902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:08.345745 systemd[1]: sshd@24-172.31.28.58:22-139.178.89.65:54902.service: Deactivated successfully. May 10 00:52:08.346568 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:52:08.347235 systemd-logind[1701]: Session 25 logged out. Waiting for processes to exit. May 10 00:52:08.348291 systemd-logind[1701]: Removed session 25. May 10 00:52:12.402430 kubelet[2592]: I0510 00:52:12.402379 2592 scope.go:117] "RemoveContainer" containerID="57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113" May 10 00:52:12.404724 env[1711]: time="2025-05-10T00:52:12.404658797Z" level=info msg="RemoveContainer for \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\"" May 10 00:52:12.411417 env[1711]: time="2025-05-10T00:52:12.411241855Z" level=info msg="RemoveContainer for \"57cf0e7ea227ffa3987ed4eafdcc27d708ec8553c012f7e3ff1b809fa5244113\" returns successfully" May 10 00:52:12.413047 env[1711]: time="2025-05-10T00:52:12.413008765Z" level=info msg="StopPodSandbox for \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\"" May 10 00:52:12.413318 env[1711]: time="2025-05-10T00:52:12.413265293Z" level=info msg="TearDown network for sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" successfully" May 10 00:52:12.413423 env[1711]: time="2025-05-10T00:52:12.413315577Z" level=info msg="StopPodSandbox for \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" returns successfully" May 10 00:52:12.413641 env[1711]: time="2025-05-10T00:52:12.413614202Z" level=info msg="RemovePodSandbox for \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\"" May 10 00:52:12.413773 env[1711]: time="2025-05-10T00:52:12.413645107Z" level=info msg="Forcibly stopping sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\"" May 10 00:52:12.413773 env[1711]: time="2025-05-10T00:52:12.413753437Z" level=info msg="TearDown network for sandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" successfully" May 10 00:52:12.421800 env[1711]: time="2025-05-10T00:52:12.421707904Z" level=info msg="RemovePodSandbox \"4fa084351904660c6fe7e59d5df36915b35c5663b9670370075c95f07d87ce19\" returns successfully" May 10 00:52:12.422331 env[1711]: time="2025-05-10T00:52:12.422283057Z" level=info msg="StopPodSandbox for \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\"" May 10 00:52:12.741748 update_engine[1702]: I0510 00:52:12.741597 1702 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:12.742895 update_engine[1702]: I0510 00:52:12.742786 1702 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:12.743012 update_engine[1702]: I0510 00:52:12.742959 1702 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:12.743619 update_engine[1702]: E0510 00:52:12.743590 1702 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:12.743733 update_engine[1702]: I0510 00:52:12.743680 1702 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 May 10 00:52:12.768944 kernel: kauditd_printk_skb: 19 callbacks suppressed May 10 00:52:12.769694 kernel: audit: type=1400 audit(1746838332.762:1915): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.762000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.762000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.777555 kernel: audit: type=1400 audit(1746838332.762:1916): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.786418 kernel: audit: type=1300 audit(1746838332.762:1916): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bd28e0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.786491 kernel: audit: type=1327 audit(1746838332.762:1916): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:12.762000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bd28e0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:12.762000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d4d920 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:12.810065 kernel: audit: type=1300 audit(1746838332.762:1915): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d4d920 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.810205 kernel: audit: type=1327 audit(1746838332.762:1915): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:12.816777 kernel: audit: type=1400 audit(1746838332.778:1917): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.778000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.778000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bd2aa0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.778000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:12.832982 kernel: audit: type=1300 audit(1746838332.778:1917): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bd2aa0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.833159 kernel: audit: type=1327 audit(1746838332.778:1917): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:12.833210 kernel: audit: type=1400 audit(1746838332.779:1918): avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.779000 audit[2442]: AVC avc: denied { watch } for pid=2442 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:12.779000 audit[2442]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bd2ae0 a2=fc6 a3=0 items=0 ppid=2295 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:12.779000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:12.847 [WARNING][7707] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:12.853 [INFO][7707] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:12.853 [INFO][7707] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" iface="eth0" netns="" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:12.853 [INFO][7707] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:12.853 [INFO][7707] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.116 [INFO][7714] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.122 [INFO][7714] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.122 [INFO][7714] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.138 [WARNING][7714] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.138 [INFO][7714] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.140 [INFO][7714] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:52:13.144169 env[1711]: 2025-05-10 00:52:13.142 [INFO][7707] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.145587 env[1711]: time="2025-05-10T00:52:13.144201431Z" level=info msg="TearDown network for sandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" successfully" May 10 00:52:13.145587 env[1711]: time="2025-05-10T00:52:13.144232620Z" level=info msg="StopPodSandbox for \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" returns successfully" May 10 00:52:13.145587 env[1711]: time="2025-05-10T00:52:13.144776123Z" level=info msg="RemovePodSandbox for \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\"" May 10 00:52:13.145587 env[1711]: time="2025-05-10T00:52:13.144808566Z" level=info msg="Forcibly stopping sandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\"" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.185 [WARNING][7733] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.185 [INFO][7733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.185 [INFO][7733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" iface="eth0" netns="" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.185 [INFO][7733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.185 [INFO][7733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.212 [INFO][7740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.212 [INFO][7740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.212 [INFO][7740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.220 [WARNING][7740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.220 [INFO][7740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" HandleID="k8s-pod-network.e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" Workload="ip--172--31--28--58-k8s-calico--apiserver--7d74784d74--r928m-eth0" May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.222 [INFO][7740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:52:13.229676 env[1711]: 2025-05-10 00:52:13.225 [INFO][7733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b" May 10 00:52:13.230464 env[1711]: time="2025-05-10T00:52:13.230413105Z" level=info msg="TearDown network for sandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" successfully" May 10 00:52:13.237483 env[1711]: time="2025-05-10T00:52:13.237415300Z" level=info msg="RemovePodSandbox \"e7a44e281a26933bab8ef075865d684d9ee2d654f4370f8d102a2ddce3205e0b\" returns successfully" May 10 00:52:13.237990 env[1711]: time="2025-05-10T00:52:13.237964627Z" level=info msg="StopPodSandbox for \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\"" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.279 [WARNING][7759] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.279 [INFO][7759] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.279 [INFO][7759] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" iface="eth0" netns="" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.279 [INFO][7759] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.279 [INFO][7759] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.306 [INFO][7766] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.306 [INFO][7766] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.308 [INFO][7766] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.315 [WARNING][7766] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.315 [INFO][7766] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.317 [INFO][7766] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:52:13.321037 env[1711]: 2025-05-10 00:52:13.319 [INFO][7759] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.323835 env[1711]: time="2025-05-10T00:52:13.321070591Z" level=info msg="TearDown network for sandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" successfully" May 10 00:52:13.323835 env[1711]: time="2025-05-10T00:52:13.321099651Z" level=info msg="StopPodSandbox for \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" returns successfully" May 10 00:52:13.323835 env[1711]: time="2025-05-10T00:52:13.321636339Z" level=info msg="RemovePodSandbox for \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\"" May 10 00:52:13.323835 env[1711]: time="2025-05-10T00:52:13.321680260Z" level=info msg="Forcibly stopping sandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\"" May 10 00:52:13.366953 systemd[1]: Started sshd@25-172.31.28.58:22-139.178.89.65:54904.service. May 10 00:52:13.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.58:22-139.178.89.65:54904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.363 [WARNING][7785] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" WorkloadEndpoint="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.363 [INFO][7785] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.363 [INFO][7785] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" iface="eth0" netns="" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.363 [INFO][7785] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.363 [INFO][7785] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.409 [INFO][7793] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.409 [INFO][7793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.409 [INFO][7793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.418 [WARNING][7793] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.418 [INFO][7793] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" HandleID="k8s-pod-network.d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" Workload="ip--172--31--28--58-k8s-calico--kube--controllers--7d4dc549b6--r5rcc-eth0" May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.420 [INFO][7793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:52:13.425519 env[1711]: 2025-05-10 00:52:13.422 [INFO][7785] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b" May 10 00:52:13.426480 env[1711]: time="2025-05-10T00:52:13.426446577Z" level=info msg="TearDown network for sandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" successfully" May 10 00:52:13.433812 env[1711]: time="2025-05-10T00:52:13.432980678Z" level=info msg="RemovePodSandbox \"d57ed7303c006a188dce515a93997f0694cbc3c0759616ab3564b6c67d5edf8b\" returns successfully" May 10 00:52:13.433812 env[1711]: time="2025-05-10T00:52:13.433452467Z" level=info msg="StopPodSandbox for \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\"" May 10 00:52:13.433812 env[1711]: time="2025-05-10T00:52:13.433528023Z" level=info msg="TearDown network for sandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" successfully" May 10 00:52:13.433812 env[1711]: time="2025-05-10T00:52:13.433559309Z" level=info msg="StopPodSandbox for \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" returns successfully" May 10 00:52:13.434038 env[1711]: time="2025-05-10T00:52:13.433834158Z" level=info msg="RemovePodSandbox for \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\"" May 10 00:52:13.434038 env[1711]: time="2025-05-10T00:52:13.433852597Z" level=info msg="Forcibly stopping sandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\"" May 10 00:52:13.434038 env[1711]: time="2025-05-10T00:52:13.433910331Z" level=info msg="TearDown network for sandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" successfully" May 10 00:52:13.440525 env[1711]: time="2025-05-10T00:52:13.440487105Z" level=info msg="RemovePodSandbox \"9b27aaec2bbd54f809da2680b396bb0ca9e3d4318d5f3a4fe4c3cdfc8b36f8eb\" returns successfully" May 10 00:52:13.601000 audit[7794]: USER_ACCT pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:13.602860 sshd[7794]: Accepted publickey for core from 139.178.89.65 port 54904 ssh2: RSA SHA256:qeBqllzRe8v74cvXiP1dOdqqawM7kzZ4c6tDX3pmCBQ May 10 00:52:13.603000 audit[7794]: CRED_ACQ pid=7794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:13.604000 audit[7794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeee233e80 a2=3 a3=0 items=0 ppid=1 pid=7794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:13.604000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:52:13.607523 sshd[7794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:52:13.616387 systemd[1]: Started session-26.scope. May 10 00:52:13.617035 systemd-logind[1701]: New session 26 of user core. May 10 00:52:13.622000 audit[7794]: USER_START pid=7794 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:13.624000 audit[7801]: CRED_ACQ pid=7801 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:14.049697 sshd[7794]: pam_unix(sshd:session): session closed for user core May 10 00:52:14.050000 audit[7794]: USER_END pid=7794 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:14.050000 audit[7794]: CRED_DISP pid=7794 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' May 10 00:52:14.053077 systemd[1]: sshd@25-172.31.28.58:22-139.178.89.65:54904.service: Deactivated successfully. May 10 00:52:14.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.28.58:22-139.178.89.65:54904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:52:14.054258 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:52:14.055092 systemd-logind[1701]: Session 26 logged out. Waiting for processes to exit. May 10 00:52:14.056076 systemd-logind[1701]: Removed session 26. May 10 00:52:22.746914 update_engine[1702]: I0510 00:52:22.746856 1702 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:22.747349 update_engine[1702]: I0510 00:52:22.747100 1702 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:22.747349 update_engine[1702]: I0510 00:52:22.747275 1702 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:22.747842 update_engine[1702]: E0510 00:52:22.747813 1702 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:22.747963 update_engine[1702]: I0510 00:52:22.747901 1702 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 10 00:52:22.749061 update_engine[1702]: I0510 00:52:22.749037 1702 omaha_request_action.cc:621] Omaha request response: May 10 00:52:22.753325 update_engine[1702]: E0510 00:52:22.753286 1702 omaha_request_action.cc:640] Omaha request network transfer failed. May 10 00:52:22.753460 update_engine[1702]: I0510 00:52:22.753360 1702 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. May 10 00:52:22.753460 update_engine[1702]: I0510 00:52:22.753368 1702 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 10 00:52:22.753460 update_engine[1702]: I0510 00:52:22.753372 1702 update_attempter.cc:306] Processing Done. May 10 00:52:22.754117 update_engine[1702]: E0510 00:52:22.754086 1702 update_attempter.cc:619] Update failed. May 10 00:52:22.754117 update_engine[1702]: I0510 00:52:22.754106 1702 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse May 10 00:52:22.754117 update_engine[1702]: I0510 00:52:22.754110 1702 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) May 10 00:52:22.754117 update_engine[1702]: I0510 00:52:22.754115 1702 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. May 10 00:52:22.760185 update_engine[1702]: I0510 00:52:22.759733 1702 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction May 10 00:52:22.760185 update_engine[1702]: I0510 00:52:22.759776 1702 omaha_request_action.cc:270] Posting an Omaha request to disabled May 10 00:52:22.760185 update_engine[1702]: I0510 00:52:22.759781 1702 omaha_request_action.cc:271] Request: May 10 00:52:22.760185 update_engine[1702]: May 10 00:52:22.760185 update_engine[1702]: May 10 00:52:22.760185 update_engine[1702]: May 10 00:52:22.760185 update_engine[1702]: May 10 00:52:22.760185 update_engine[1702]: May 10 00:52:22.760185 update_engine[1702]: May 10 00:52:22.760185 update_engine[1702]: I0510 00:52:22.759786 1702 libcurl_http_fetcher.cc:47] Starting/Resuming transfer May 10 00:52:22.760185 update_engine[1702]: I0510 00:52:22.759979 1702 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP May 10 00:52:22.760185 update_engine[1702]: I0510 00:52:22.760151 1702 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. May 10 00:52:22.763182 update_engine[1702]: E0510 00:52:22.761288 1702 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761385 1702 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761392 1702 omaha_request_action.cc:621] Omaha request response: May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761399 1702 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761401 1702 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761404 1702 update_attempter.cc:306] Processing Done. May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761409 1702 update_attempter.cc:310] Error event sent. May 10 00:52:22.763182 update_engine[1702]: I0510 00:52:22.761417 1702 update_check_scheduler.cc:74] Next update check in 40m5s May 10 00:52:22.783729 locksmithd[1755]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 May 10 00:52:22.783729 locksmithd[1755]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 May 10 00:52:25.431488 systemd[1]: run-containerd-runc-k8s.io-d82f50090d668ce9f95d6a539ff112f5b5902a5dbcd8e778f661e13d23eeaf3a-runc.RwxFLj.mount: Deactivated successfully. May 10 00:52:28.652000 audit: BPF prog-id=117 op=UNLOAD May 10 00:52:28.654409 systemd[1]: cri-containerd-9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1.scope: Deactivated successfully. May 10 00:52:28.654688 systemd[1]: cri-containerd-9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1.scope: Consumed 3.001s CPU time. May 10 00:52:28.657159 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:52:28.657231 kernel: audit: type=1334 audit(1746838348.652:1928): prog-id=117 op=UNLOAD May 10 00:52:28.660000 audit: BPF prog-id=120 op=UNLOAD May 10 00:52:28.665772 kernel: audit: type=1334 audit(1746838348.660:1929): prog-id=120 op=UNLOAD May 10 00:52:28.695346 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1-rootfs.mount: Deactivated successfully. May 10 00:52:28.697159 env[1711]: time="2025-05-10T00:52:28.697100756Z" level=info msg="shim disconnected" id=9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1 May 10 00:52:28.697552 env[1711]: time="2025-05-10T00:52:28.697160094Z" level=warning msg="cleaning up after shim disconnected" id=9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1 namespace=k8s.io May 10 00:52:28.697552 env[1711]: time="2025-05-10T00:52:28.697174347Z" level=info msg="cleaning up dead shim" May 10 00:52:28.706620 env[1711]: time="2025-05-10T00:52:28.706569167Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:52:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7867 runtime=io.containerd.runc.v2\n" May 10 00:52:28.981566 systemd[1]: run-containerd-runc-k8s.io-8939be2a70bd1bd4bba30b4f1434eb9c38c08c91918fdce5c2b46b89f6ad28fd-runc.0tcuPs.mount: Deactivated successfully. May 10 00:52:29.040369 kubelet[2592]: I0510 00:52:29.040342 2592 scope.go:117] "RemoveContainer" containerID="9cdd590a571ca8c451828cf90329a99af6d7095b905c17ad79f096cee90f2bf1" May 10 00:52:29.070123 env[1711]: time="2025-05-10T00:52:29.070072176Z" level=info msg="CreateContainer within sandbox \"ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" May 10 00:52:29.093409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3427656434.mount: Deactivated successfully. May 10 00:52:29.101205 env[1711]: time="2025-05-10T00:52:29.098616708Z" level=info msg="CreateContainer within sandbox \"ec8a5039b3a8d14506b9683688a901ca6368aab7f4f6b465656660afb691b08c\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"49995af6b4ff74b976e86351691717f41913aceb909323b334e5ee93930a64f4\"" May 10 00:52:29.101205 env[1711]: time="2025-05-10T00:52:29.099178858Z" level=info msg="StartContainer for \"49995af6b4ff74b976e86351691717f41913aceb909323b334e5ee93930a64f4\"" May 10 00:52:29.121350 systemd[1]: Started cri-containerd-49995af6b4ff74b976e86351691717f41913aceb909323b334e5ee93930a64f4.scope. May 10 00:52:29.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.158149 kernel: audit: type=1400 audit(1746838349.149:1930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.173688 kernel: audit: type=1400 audit(1746838349.149:1931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.173854 kernel: audit: type=1400 audit(1746838349.149:1932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.173901 kernel: audit: type=1400 audit(1746838349.149:1933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.189129 kernel: audit: type=1400 audit(1746838349.149:1934): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.189253 kernel: audit: type=1400 audit(1746838349.149:1935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.214813 kernel: audit: type=1400 audit(1746838349.149:1936): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.216413 kernel: audit: type=1400 audit(1746838349.149:1937): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.149000 audit: BPF prog-id=280 op=LOAD May 10 00:52:29.156000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2659 pid=7910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393935616636623466663734623937366538363335313639313731 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2659 pid=7910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393935616636623466663734623937366538363335313639313731 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.156000 audit: BPF prog-id=281 op=LOAD May 10 00:52:29.156000 audit[7910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000345df0 items=0 ppid=2659 pid=7910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393935616636623466663734623937366538363335313639313731 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit: BPF prog-id=282 op=LOAD May 10 00:52:29.157000 audit[7910]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000345e38 items=0 ppid=2659 pid=7910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393935616636623466663734623937366538363335313639313731 May 10 00:52:29.157000 audit: BPF prog-id=282 op=UNLOAD May 10 00:52:29.157000 audit: BPF prog-id=281 op=UNLOAD May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { perfmon } for pid=7910 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit[7910]: AVC avc: denied { bpf } for pid=7910 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:29.157000 audit: BPF prog-id=283 op=LOAD May 10 00:52:29.157000 audit[7910]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00040a248 items=0 ppid=2659 pid=7910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:29.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393935616636623466663734623937366538363335313639313731 May 10 00:52:29.236213 env[1711]: time="2025-05-10T00:52:29.226257025Z" level=info msg="StartContainer for \"49995af6b4ff74b976e86351691717f41913aceb909323b334e5ee93930a64f4\" returns successfully" May 10 00:52:29.240143 systemd[1]: cri-containerd-9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9.scope: Deactivated successfully. May 10 00:52:29.240490 systemd[1]: cri-containerd-9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9.scope: Consumed 4.212s CPU time. May 10 00:52:29.241000 audit: BPF prog-id=80 op=UNLOAD May 10 00:52:29.241000 audit: BPF prog-id=96 op=UNLOAD May 10 00:52:29.272460 env[1711]: time="2025-05-10T00:52:29.272405099Z" level=info msg="shim disconnected" id=9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9 May 10 00:52:29.272460 env[1711]: time="2025-05-10T00:52:29.272460758Z" level=warning msg="cleaning up after shim disconnected" id=9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9 namespace=k8s.io May 10 00:52:29.272757 env[1711]: time="2025-05-10T00:52:29.272472811Z" level=info msg="cleaning up dead shim" May 10 00:52:29.282193 env[1711]: time="2025-05-10T00:52:29.282135449Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:52:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=7947 runtime=io.containerd.runc.v2\n" May 10 00:52:29.695131 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9-rootfs.mount: Deactivated successfully. May 10 00:52:30.043895 kubelet[2592]: I0510 00:52:30.043860 2592 scope.go:117] "RemoveContainer" containerID="9d6b0cdec4aa35e94377a6b8726e38d8287ce7108b92476fabacbefd09f507e9" May 10 00:52:30.047756 env[1711]: time="2025-05-10T00:52:30.047628629Z" level=info msg="CreateContainer within sandbox \"ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" May 10 00:52:30.076451 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1435505946.mount: Deactivated successfully. May 10 00:52:30.088643 env[1711]: time="2025-05-10T00:52:30.088586515Z" level=info msg="CreateContainer within sandbox \"ddd6013e7ef1e0609e7792587e17e5d53f2d46191a83ea9bd04554e398b1a8d7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"b24952731dd7bbb3d3f184ba7d90e143440813a0bdbb1615fa312d478b4b2743\"" May 10 00:52:30.089202 env[1711]: time="2025-05-10T00:52:30.089170535Z" level=info msg="StartContainer for \"b24952731dd7bbb3d3f184ba7d90e143440813a0bdbb1615fa312d478b4b2743\"" May 10 00:52:30.115609 systemd[1]: Started cri-containerd-b24952731dd7bbb3d3f184ba7d90e143440813a0bdbb1615fa312d478b4b2743.scope. May 10 00:52:30.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.137000 audit: BPF prog-id=284 op=LOAD May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2295 pid=7974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:30.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232343935323733316464376262623364336631383462613764393065 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2295 pid=7974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:30.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232343935323733316464376262623364336631383462613764393065 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit: BPF prog-id=285 op=LOAD May 10 00:52:30.138000 audit[7974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00025bd10 items=0 ppid=2295 pid=7974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:30.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232343935323733316464376262623364336631383462613764393065 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit: BPF prog-id=286 op=LOAD May 10 00:52:30.138000 audit[7974]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00025bd58 items=0 ppid=2295 pid=7974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:30.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232343935323733316464376262623364336631383462613764393065 May 10 00:52:30.138000 audit: BPF prog-id=286 op=UNLOAD May 10 00:52:30.138000 audit: BPF prog-id=285 op=UNLOAD May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { perfmon } for pid=7974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit[7974]: AVC avc: denied { bpf } for pid=7974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:30.138000 audit: BPF prog-id=287 op=LOAD May 10 00:52:30.138000 audit[7974]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0003c6168 items=0 ppid=2295 pid=7974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:30.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232343935323733316464376262623364336631383462613764393065 May 10 00:52:30.177338 env[1711]: time="2025-05-10T00:52:30.177251383Z" level=info msg="StartContainer for \"b24952731dd7bbb3d3f184ba7d90e143440813a0bdbb1615fa312d478b4b2743\" returns successfully" May 10 00:52:31.469000 audit[7985]: AVC avc: denied { watch } for pid=7985 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:31.469000 audit[7985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00037bc20 a2=fc6 a3=0 items=0 ppid=2295 pid=7985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:31.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:31.469000 audit[7985]: AVC avc: denied { watch } for pid=7985 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:52:31.469000 audit[7985]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0001563a0 a2=fc6 a3=0 items=0 ppid=2295 pid=7985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c682 key=(null) May 10 00:52:31.469000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:52:32.612843 kubelet[2592]: E0510 00:52:32.612781 2592 controller.go:195] "Failed to update lease" err="Put \"https://172.31.28.58:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-28-58?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" May 10 00:52:34.324923 systemd[1]: cri-containerd-56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4.scope: Deactivated successfully. May 10 00:52:34.325250 systemd[1]: cri-containerd-56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4.scope: Consumed 2.390s CPU time. May 10 00:52:34.334540 kernel: kauditd_printk_skb: 114 callbacks suppressed May 10 00:52:34.334702 kernel: audit: type=1334 audit(1746838354.328:1970): prog-id=84 op=UNLOAD May 10 00:52:34.328000 audit: BPF prog-id=84 op=UNLOAD May 10 00:52:34.337735 kernel: audit: type=1334 audit(1746838354.328:1971): prog-id=95 op=UNLOAD May 10 00:52:34.328000 audit: BPF prog-id=95 op=UNLOAD May 10 00:52:34.361274 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4-rootfs.mount: Deactivated successfully. May 10 00:52:34.362547 env[1711]: time="2025-05-10T00:52:34.361950972Z" level=info msg="shim disconnected" id=56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4 May 10 00:52:34.362547 env[1711]: time="2025-05-10T00:52:34.362004234Z" level=warning msg="cleaning up after shim disconnected" id=56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4 namespace=k8s.io May 10 00:52:34.362547 env[1711]: time="2025-05-10T00:52:34.362016234Z" level=info msg="cleaning up dead shim" May 10 00:52:34.372232 env[1711]: time="2025-05-10T00:52:34.372183576Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:52:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8015 runtime=io.containerd.runc.v2\n" May 10 00:52:35.060194 kubelet[2592]: I0510 00:52:35.060161 2592 scope.go:117] "RemoveContainer" containerID="56b68d140380f0036dee9d9917f4db95e4fc5d2298a8910a6bff3098b434e4b4" May 10 00:52:35.062742 env[1711]: time="2025-05-10T00:52:35.062269255Z" level=info msg="CreateContainer within sandbox \"dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" May 10 00:52:35.083377 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3101802951.mount: Deactivated successfully. May 10 00:52:35.093251 env[1711]: time="2025-05-10T00:52:35.093176407Z" level=info msg="CreateContainer within sandbox \"dae35d75d33338468f07f4cc7e75c238e496d5b2dbab4c5bcad046ecbcc2ecdf\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"4b923c3db935d52206152548a83ef862da9dd8e887bf50fce0a8c8208dc801d5\"" May 10 00:52:35.093955 env[1711]: time="2025-05-10T00:52:35.093917737Z" level=info msg="StartContainer for \"4b923c3db935d52206152548a83ef862da9dd8e887bf50fce0a8c8208dc801d5\"" May 10 00:52:35.116874 systemd[1]: Started cri-containerd-4b923c3db935d52206152548a83ef862da9dd8e887bf50fce0a8c8208dc801d5.scope. May 10 00:52:35.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150548 kernel: audit: type=1400 audit(1746838355.134:1972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150729 kernel: audit: type=1400 audit(1746838355.134:1973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.164448 kernel: audit: type=1400 audit(1746838355.134:1974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.164584 kernel: audit: type=1400 audit(1746838355.134:1975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.172190 kernel: audit: type=1400 audit(1746838355.134:1976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.178413 kernel: audit: type=1400 audit(1746838355.134:1977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.184473 kernel: audit: type=1400 audit(1746838355.134:1978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.192804 kernel: audit: type=1400 audit(1746838355.134:1979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.134000 audit: BPF prog-id=288 op=LOAD May 10 00:52:35.135000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2305 pid=8035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:35.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393233633364623933356435323230363135323534386138336566 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2305 pid=8035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:35.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393233633364623933356435323230363135323534386138336566 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.135000 audit: BPF prog-id=289 op=LOAD May 10 00:52:35.135000 audit[8035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000369df0 items=0 ppid=2305 pid=8035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:35.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393233633364623933356435323230363135323534386138336566 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.142000 audit: BPF prog-id=290 op=LOAD May 10 00:52:35.142000 audit[8035]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000369e38 items=0 ppid=2305 pid=8035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:35.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393233633364623933356435323230363135323534386138336566 May 10 00:52:35.150000 audit: BPF prog-id=290 op=UNLOAD May 10 00:52:35.150000 audit: BPF prog-id=289 op=UNLOAD May 10 00:52:35.150000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { perfmon } for pid=8035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit[8035]: AVC avc: denied { bpf } for pid=8035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:52:35.150000 audit: BPF prog-id=291 op=LOAD May 10 00:52:35.150000 audit[8035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003de248 items=0 ppid=2305 pid=8035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:52:35.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462393233633364623933356435323230363135323534386138336566 May 10 00:52:35.225925 env[1711]: time="2025-05-10T00:52:35.225866264Z" level=info msg="StartContainer for \"4b923c3db935d52206152548a83ef862da9dd8e887bf50fce0a8c8208dc801d5\" returns successfully"